咨询与建议

限定检索结果

文献类型

  • 930 篇 期刊文献
  • 703 篇 会议
  • 1 册 图书

馆藏范围

  • 1,634 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,105 篇 工学
    • 789 篇 计算机科学与技术...
    • 662 篇 软件工程
    • 294 篇 信息与通信工程
    • 191 篇 电气工程
    • 153 篇 生物工程
    • 126 篇 控制科学与工程
    • 106 篇 生物医学工程(可授...
    • 101 篇 光学工程
    • 98 篇 电子科学与技术(可...
    • 58 篇 机械工程
    • 51 篇 化学工程与技术
    • 45 篇 交通运输工程
    • 44 篇 仪器科学与技术
    • 35 篇 网络空间安全
    • 34 篇 建筑学
    • 33 篇 土木工程
    • 32 篇 航空宇航科学与技...
  • 594 篇 理学
    • 328 篇 数学
    • 173 篇 生物学
    • 121 篇 物理学
    • 113 篇 统计学(可授理学、...
    • 56 篇 化学
    • 45 篇 系统科学
  • 309 篇 管理学
    • 177 篇 管理科学与工程(可...
    • 146 篇 图书情报与档案管...
    • 74 篇 工商管理
  • 99 篇 医学
    • 91 篇 临床医学
    • 77 篇 基础医学(可授医学...
    • 56 篇 药学(可授医学、理...
  • 44 篇 法学
    • 35 篇 社会学
  • 24 篇 经济学
  • 19 篇 农学
  • 15 篇 教育学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 84 篇 semantics
  • 67 篇 feature extracti...
  • 48 篇 training
  • 47 篇 deep learning
  • 37 篇 federated learni...
  • 36 篇 computational mo...
  • 35 篇 accuracy
  • 32 篇 data models
  • 30 篇 convolution
  • 28 篇 contrastive lear...
  • 25 篇 machine learning
  • 24 篇 data mining
  • 24 篇 predictive model...
  • 21 篇 deep neural netw...
  • 21 篇 image segmentati...
  • 21 篇 visualization
  • 21 篇 robustness
  • 20 篇 neural networks
  • 20 篇 measurement
  • 18 篇 graph neural net...

机构

  • 55 篇 key laboratory o...
  • 54 篇 shandong provinc...
  • 54 篇 college of compu...
  • 52 篇 shandong enginee...
  • 51 篇 national enginee...
  • 39 篇 beijing advanced...
  • 39 篇 school of cyber ...
  • 37 篇 school of comput...
  • 36 篇 university of ch...
  • 36 篇 college of compu...
  • 35 篇 nanyang technolo...
  • 29 篇 school of big da...
  • 29 篇 national enginee...
  • 28 篇 hubei key labora...
  • 27 篇 college of compu...
  • 27 篇 peng cheng labor...
  • 27 篇 hubei engineerin...
  • 26 篇 services computi...
  • 26 篇 school of comput...
  • 25 篇 cluster and grid...

作者

  • 72 篇 niyato dusit
  • 31 篇 jin hai
  • 24 篇 shen linlin
  • 23 篇 sun geng
  • 21 篇 hai jin
  • 20 篇 hu shengshan
  • 19 篇 wang jiacheng
  • 17 篇 huang qingming
  • 16 篇 xu qianqian
  • 16 篇 liu bin
  • 15 篇 zhang leo yu
  • 15 篇 li jiahui
  • 15 篇 liu ya-feng
  • 14 篇 huang sheng
  • 14 篇 zhou ziqi
  • 13 篇 cao xiaochun
  • 13 篇 li minghui
  • 12 篇 wang jinbao
  • 12 篇 wang lihui
  • 12 篇 mingzhe chen

语言

  • 1,328 篇 英文
  • 286 篇 其他
  • 33 篇 中文
检索条件"机构=Key Laboratory of Data Engineering and Visual Computing"
1634 条 记 录,以下是821-830 订阅
排序:
Disentangled Cascaded Graph Convolution Networks for Multi-Behavior Recommendation
收藏 引用
ACM Transactions on Recommender Systems 2024年 第4期2卷 1-27页
作者: Zhiyong Cheng Jianhua Dong Fan Liu Lei Zhu Xun Yang Meng Wang School of Computer Science and Information Engineering Hefei University of Technology Hefei China Shandong Artificial Intelligence Institute Qilu University of Technology (Shandong Academy of Sciences) Jinan China School of Computing National University of Singapore Singapore Singapore School of Electronic and Information Engineering Tongji University Shanghai China School of Information Science and Technology University of Science and Technology of China Hefei China Key Laboratory of Knowledge Engineering with Big Data Hefei University of Technology Hefei China and Hefei Comprehensive National Science Center Hefei China
Multi-behavioral recommender systems have emerged as a solution to address data sparsity and cold-start issues by incorporating auxiliary behaviors alongside target behaviors. However, existing models struggle to accu... 详细信息
来源: 评论
ADA-GAD: Anomaly-Denoised Autoencoders for Graph Anomaly Detection
arXiv
收藏 引用
arXiv 2023年
作者: He, Junwei Xu, Qianqian Jiang, Yangbangyan Wang, Zitai Huang, Qingming Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Institute of Information Engineering CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China
Graph anomaly detection is crucial for identifying nodes that deviate from regular behavior within graphs, benefiting various domains such as fraud detection and social network. Although existing reconstruction-based ... 详细信息
来源: 评论
High-Frequency Stereo Matching Network
High-Frequency Stereo Matching Network
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Haoliang Zhao Huizhou Zhou Yongjun Zhang Jie Chen Yitong Yang Yong Zhao Text Computing & Cognitive Intelligence Engineering Research Center of National Education Ministry State Key Laboratory of Public Big Data College of Computer Science and Technology Institute of Artificial Intelligence Guizhou University Guiyang Guizhou China Ghost-Valley AI Technology Shenzhen Guangdong China School of Physics and Optoelectronic Engineering Guangdong University of Technology Guangzhou China The Key Laboratory of Integrated Microsystems Shenzhen Graduate School Peking University China
In the field of binocular stereo matching, remarkable progress has been made by iterative methods like RAFT-Stereo and CREStereo. However, most of these methods lose information during the iterative process, making it...
来源: 评论
Anchor-Based Discriminative Dual Distribution Calibration for Transductive Zero-Shot Learning
SSRN
收藏 引用
SSRN 2023年
作者: Zhang, Yi Huang, Sheng Yang, Wanli Tang, Wenhao Zhang, Xiaohong Yang, Dan School of Big Data and Software Engineering Chongqing University No.55 Daxuecheng South Rd. Chongqing Shapingba401331 China Ministry of Education Key Laboratory of Dependable Service Computing in Cyber Physical Society Chongqing University No.174 Shazhengjie Chongqing Shapingba400044 China
Zero-shot learning (ZSL) is machine learning task to recognize samples from classes that are not observed during training. Transductive ZSL (TZSL) is a more realistic and effective paradigm that leverages unlabeled un... 详细信息
来源: 评论
On the Fine-Grained Crowd Analysis via Passive WiFi Sensing
TechRxiv
收藏 引用
TechRxiv 2023年
作者: Hao, Lifei Huang, Baoqi Jia, Bing Mao, Guoqiang The Engineering Research Center of Ecological Big Data Ministry of Education The Inner Mongolia A.R. Key Laboratory of Wireless Networking and Mobile Computing The College of Computer Science Inner Mongolia University Hohhot010021 China The Research Institute of Smart Transportation Xidian University Xi’an710071 China
Regarding the passive WiFi sensing based crowd analysis, this paper first theoretically investigates its limitations, and then proposes a deep learning based scheme targeted for returning fine-grained crowd states in ... 详细信息
来源: 评论
Breaking IoT data Silos: Trustworthy data Trading with Consortium Blockchain and Zero-Knowledge Proof
Breaking IoT Data Silos: Trustworthy Data Trading with Conso...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Wanshan Liu Yubing Han Guijuan Wang Yao Huang Anming Dong Jiguo Yu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Big Data Institute Qilu University of Technology Jinan China
The Internet of Things (IoT) connects numerous de-vices and sensors, generating data with significant informational and economic value. However, data silos hinder effective data utilization and trading, leading to the... 详细信息
来源: 评论
BCPPAS : Blockchain-Based Cross-Domain Identity Authentication Scheme for IoT with Privacy Protection
BCPPAS : Blockchain-Based Cross-Domain Identity Authenticati...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Qianqian Li Yubing Han Qi Liu Guijuan Wang Hao Yu Jiguo Yu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China Big Data Institute Qilu University of Technology Jinan China
In Internet of Things(IoT) systems, ensuring the secure exchange of information between devices from different domains is crucial. Current cross-domain authentication schemes based on a single blockchain struggle to m... 详细信息
来源: 评论
MDEC: Mamba-based Debiased Extended Contrast Learning in Sequential Recommendation
MDEC: Mamba-based Debiased Extended Contrast Learning in Seq...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Yan Huang Zhenyu Yang Baojie Xu Wenyue Hu Zhibo Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Recommender systems are critical for mitigating information overload, assisting users in uncovering their latent interests, and enhancing their overall experience. Sequential recommendation leverages users' histor... 详细信息
来源: 评论
Camera-Conditioned Stable Feature Generation for Isolated Camera Supervised Person Re-IDentification
arXiv
收藏 引用
arXiv 2022年
作者: Wu, Chao Ge, Wenhang Wu, Ancong Chang, Xiaobin School of Artificial Intelligence Sun Yat-sen University China Guangdong Key Laboratory of Big Data Analysis and Processing Guangzhou510006 China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China School of Computer Science and Engineering Sun Yat-sen University China
To learn camera-view invariant features for person Re-IDentification (Re-ID), the cross-camera image pairs of each person play an important role. However, such cross-view training samples could be unavailable under th... 详细信息
来源: 评论
Violence Detection In Videos via Motion-Guided Global and Local Views
Violence Detection In Videos via Motion-Guided Global and Lo...
收藏 引用
IEEE International Conference on data Science in Cyberspace (DSC)
作者: Ning Su Lijuan Sun Yutong Gao Jingchen Wu Xu Wu Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Cyberspace Security BUPT School of Economics and Management Beijing University of Posts and Telecommunications Beijing China Beijing Key Lab of Traffic Data Analysis and Mining Beijing Jiaotong University Beijing China School of Computer Science (National Pilot Software Engineering School) BUPT
Video violence detection aims to locate the time window in which violent behavior occurs. Most methods focus on utilizing RGB features directly or only fusing RGB and audio features, ignoring the effective exploitatio...
来源: 评论