咨询与建议

限定检索结果

文献类型

  • 899 篇 期刊文献
  • 651 篇 会议
  • 1 册 图书

馆藏范围

  • 1,551 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,067 篇 工学
    • 764 篇 计算机科学与技术...
    • 653 篇 软件工程
    • 286 篇 信息与通信工程
    • 187 篇 电气工程
    • 153 篇 生物工程
    • 114 篇 控制科学与工程
    • 108 篇 生物医学工程(可授...
    • 101 篇 光学工程
    • 95 篇 电子科学与技术(可...
    • 60 篇 机械工程
    • 50 篇 化学工程与技术
    • 45 篇 交通运输工程
    • 44 篇 仪器科学与技术
    • 35 篇 网络空间安全
    • 30 篇 建筑学
    • 30 篇 安全科学与工程
    • 29 篇 土木工程
  • 580 篇 理学
    • 317 篇 数学
    • 170 篇 生物学
    • 119 篇 物理学
    • 110 篇 统计学(可授理学、...
    • 55 篇 化学
    • 46 篇 系统科学
  • 300 篇 管理学
    • 172 篇 管理科学与工程(可...
    • 141 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 98 篇 医学
    • 90 篇 临床医学
    • 78 篇 基础医学(可授医学...
    • 56 篇 药学(可授医学、理...
  • 42 篇 法学
    • 34 篇 社会学
  • 24 篇 经济学
  • 19 篇 农学
  • 13 篇 教育学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 80 篇 semantics
  • 61 篇 feature extracti...
  • 43 篇 deep learning
  • 43 篇 training
  • 32 篇 data models
  • 31 篇 computational mo...
  • 29 篇 accuracy
  • 28 篇 convolution
  • 28 篇 federated learni...
  • 25 篇 machine learning
  • 24 篇 predictive model...
  • 23 篇 data mining
  • 22 篇 contrastive lear...
  • 21 篇 deep neural netw...
  • 20 篇 image segmentati...
  • 20 篇 neural networks
  • 19 篇 visualization
  • 18 篇 graph neural net...
  • 18 篇 robustness
  • 17 篇 codes

机构

  • 54 篇 shandong provinc...
  • 46 篇 shandong enginee...
  • 44 篇 key laboratory o...
  • 43 篇 college of compu...
  • 41 篇 national enginee...
  • 39 篇 beijing advanced...
  • 36 篇 school of cyber ...
  • 35 篇 school of comput...
  • 35 篇 college of compu...
  • 33 篇 nanyang technolo...
  • 33 篇 university of ch...
  • 28 篇 school of big da...
  • 27 篇 peng cheng labor...
  • 26 篇 hubei key labora...
  • 26 篇 national enginee...
  • 25 篇 hubei engineerin...
  • 24 篇 school of comput...
  • 23 篇 services computi...
  • 23 篇 cluster and grid...
  • 21 篇 college of compu...

作者

  • 68 篇 niyato dusit
  • 30 篇 jin hai
  • 22 篇 sun geng
  • 19 篇 shen linlin
  • 19 篇 hai jin
  • 18 篇 hu shengshan
  • 18 篇 wang jiacheng
  • 17 篇 huang qingming
  • 16 篇 liu ya-feng
  • 16 篇 xu qianqian
  • 15 篇 li jiahui
  • 15 篇 liu bin
  • 14 篇 huang sheng
  • 14 篇 zhang leo yu
  • 13 篇 chen yanping
  • 13 篇 cao xiaochun
  • 13 篇 li minghui
  • 12 篇 zhou ziqi
  • 12 篇 wang lihui
  • 12 篇 mingzhe chen

语言

  • 1,405 篇 英文
  • 125 篇 其他
  • 34 篇 中文
检索条件"机构=Key Laboratory of Data Engineering and Visual Computing"
1551 条 记 录,以下是581-590 订阅
排序:
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
Detecting Backdoors During the Inference Stage Based on Corr...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Xiaogeng Liu Minghui Li Haoyu Wang Shengshan Hu Dengpan Ye Hai Jin Libing Wu Chaowei Xiao School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Software Engineering Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan University School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab Arizona State University
Deep neural networks are proven to be vulnerable to backdoor attacks. Detecting the trigger samples during the inference stage, i.e., the test-time trigger sample detection, can prevent the backdoor from being trigger...
来源: 评论
Multi-modal data based Semi-Supervised Learning for Vehicle Positioning
arXiv
收藏 引用
arXiv 2024年
作者: Huan, Ouwen Yang, Yang Luo, Tao Chen, Mingzhe Beijing Laboratory of Advanced Information Network Beijing University of Posts and Telecommunications Beijing100876 China Department of Electrical and Computer Engineering Institute for Data Science and Computing University of Miami Coral GablesFL33146 United States Beijing Key Laboratory of Network System Architecture and Convergence School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing100876 China
In this paper, a multi-modal data based semisupervised learning (SSL) framework that jointly use channel state information (CSI) data and RGB images for vehicle positioning is designed. In particular, an outdoor posit... 详细信息
来源: 评论
Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensional Input Spaces
Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensiona...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Haoxiang Jia Ming Wen Zifan Xie Xiaochen Guo Rongxin Wu Maolin Sun Kang Chen Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Services Computing Technology and System Lab Cluster and Grid Computing Lab. Hubei Engineering Research Center on Big Data Security National Engineering Research Center for Big Data Technology and System School of Informatics Xiamen University China School of Computer Science and Technology Huazhong University of Science and Technology China
Java Virtual Machine (JVM) is the fundamental software system that supports the interpretation and execution of Java bytecode. To support the surging performance demands for the increasingly complex and large-scale Ja...
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
SHAA: Spatial Hybrid Attention Network with Adaptive Cross-Entropy Loss Function for UAV-view Geo-localization
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年
作者: Chen, Nanhua Zhang, Dongshuo Jiang, Kai Yu, Meng Zhu, Yeqing Lou, Tai-Shan Zhao, Liangyu Nanyang Technological University College of Computing and Data Science Singapore639798 Singapore Xidian University State Key Laboratory of Integrated Services Networks Xi'an710071 China Zhengzhou University of Light Industry School of Electrical and Information Engineering Zhengzhou450002 China Beijing Institute of Technology School of Aerospace Engineering Beijing100081 China Beijing Institute of Technology Zhengzhou Research Institute Zhengzhou450000 China Beijing Institute of Technology National Key Laboratory of Land and Air Based Information Perception and Control Beijing100081 China
Cross-view geo-localization provides an offline visual positioning strategy for unmanned aerial vehicles (UAVs) in Global Navigation Satellite System (GNSS)-denied environments. However, it still faces the following c... 详细信息
来源: 评论
Energy Efficient Probabilistic Semantic Communication over SAGIN
Energy Efficient Probabilistic Semantic Communication over S...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Zhouxiang Zhao Zhaohui Yang Mingzhe Chen Xu Gan Chongwen Huang Wei Xu Zhaoyang Zhang College of Information Science and Electronic Engineering Zhejiang University Hangzhou China Zhejiang Provincial Key Laboratory of Info. Proc. Commun. & Netw. (IPCAN) Hangzhou China Department of Electrical and Computer Engineering and Institute for Data Science and Computing University of Miami Coral Gables FL USA National Mobile Communications Research Laboratory Southeast University Nanjing China
In this paper, the energy efficiency maximization problem in space-air-ground integrated network (SAGIN)-enabled probabilistic semantic communication (PSC) is investigated. In the considered model, a satellite needs t... 详细信息
来源: 评论
Provably Secure Authenticated key-Management Mechanism for e-Healthcare Environment
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Ghaffar, Zahid Xie, Yong Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Douliu64002 Taiwan Qinghai Institute of Technology School of Computer and Information Science China Qinghai Provincial Laboratory for Intelligent Computing and Application China Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan250353 China
The Internet of Things (IoT) is rapidly permeating all aspects of human life, involving a network of devices that share sensitive data. A notable application is the e-healthcare systems, which employ connected sensors... 详细信息
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Li, Minghui Liu, Wei Hu, Shengshan Zhang, Yechao Wan, Wei Xue, Lulu Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab. China Cluster and Grid Computing Lab. China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
A Privacy Preserving and Byzantine Robust Collaborative Federated Learning Method Design
A Privacy Preserving and Byzantine Robust Collaborative Fede...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Nuocheng Yang Sihua Wang Mingzhe Chen Changchuan Yin Christopher G. Brinton Beijing Laboratory of Advanced Information Network Beijing University of Posts and Telecommunications Beijing China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China Department of Electrical and Computer Engineering Institute for Data Science and Computing University of Miami Coral Gables FL USA School of Electrical and Computer Engineering Purdue University West Lafayette IN USA
Collaborative federated learning (CFL) enables device cooperation in training shared machine learning models without reliance on a parameter server. However, the absence of a parameter server also impacts vulnerabilit... 详细信息
来源: 评论
Covert Communication in RSMA-Assisted Ambient Backscatter Communication Systems
收藏 引用
IEEE Transactions on Wireless Communications 2025年
作者: Zhang, Zhuo Yang, Liang Lei, Hongjiang Li, Xingwang Niyato, Dusit Hunan University College of Computer Science and Electronic Engineering Changsha410082 China Hunan University College of Computer Science and Electronic Engineering China Jishou University School of Communication and Electronic Engineering China Chongqing University of Posts and Telecommunications School of Communications and Information Engineering The Chongqing Key Laboratory of Mobile Communications Technology Chongqing400065 China Henan Polytechnic University School of Physics and Electronic Information Engineering Jiaozuo454003 China Nanyang Technological University College of Computing and Data Science Singapore639798 Singapore
In this paper, we investigate covert communication in rate-splitting multiple access (RSMA)-assisted ambient backscatter communication (AmBC) systems. Specifically, in the presence of illegitimate users, a base statio... 详细信息
来源: 评论