咨询与建议

限定检索结果

文献类型

  • 178 篇 期刊文献
  • 88 篇 会议

馆藏范围

  • 266 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 153 篇 工学
    • 103 篇 计算机科学与技术...
    • 81 篇 软件工程
    • 38 篇 信息与通信工程
    • 26 篇 电气工程
    • 21 篇 生物工程
    • 14 篇 控制科学与工程
    • 10 篇 化学工程与技术
    • 10 篇 生物医学工程(可授...
    • 9 篇 交通运输工程
    • 8 篇 光学工程
    • 8 篇 环境科学与工程(可...
    • 6 篇 电子科学与技术(可...
    • 6 篇 安全科学与工程
    • 6 篇 网络空间安全
    • 5 篇 机械工程
  • 80 篇 理学
    • 41 篇 数学
    • 25 篇 生物学
    • 10 篇 化学
    • 9 篇 系统科学
    • 8 篇 物理学
    • 8 篇 统计学(可授理学、...
  • 49 篇 管理学
    • 25 篇 管理科学与工程(可...
    • 24 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 18 篇 农学
    • 15 篇 作物学
  • 15 篇 医学
    • 13 篇 临床医学
    • 12 篇 基础医学(可授医学...
    • 7 篇 公共卫生与预防医...
  • 14 篇 法学
    • 9 篇 社会学
  • 9 篇 经济学
    • 8 篇 应用经济学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 13 篇 optimum fertiliz...
  • 13 篇 fertilizer utili...
  • 13 篇 relative abundan...
  • 13 篇 optimum yield
  • 12 篇 nutrient convers...
  • 9 篇 training
  • 7 篇 feature extracti...
  • 7 篇 data models
  • 6 篇 image segmentati...
  • 5 篇 three-dimensiona...
  • 5 篇 speech processin...
  • 5 篇 semantics
  • 5 篇 privacy
  • 4 篇 object detection
  • 4 篇 predictive model...
  • 4 篇 differential pri...
  • 4 篇 blockchains
  • 4 篇 forecasting
  • 4 篇 adaptation model...
  • 3 篇 semantic segment...

机构

  • 20 篇 school of cyber ...
  • 15 篇 school of cyber ...
  • 13 篇 school of comput...
  • 13 篇 key laboratory o...
  • 13 篇 guangxi key labo...
  • 13 篇 guangxi geograph...
  • 13 篇 agro-environment...
  • 12 篇 key laboratory o...
  • 11 篇 peng cheng labor...
  • 11 篇 key laboratory o...
  • 10 篇 national institu...
  • 9 篇 key lab. of inte...
  • 9 篇 school of comput...
  • 9 篇 south china univ...
  • 9 篇 singapore manage...
  • 9 篇 gaoling school o...
  • 9 篇 center for digit...
  • 9 篇 cyber science re...
  • 8 篇 key laboratory o...
  • 8 篇 key laboratory o...

作者

  • 23 篇 huang qingming
  • 21 篇 xu qianqian
  • 15 篇 yang zhiyong
  • 13 篇 shutian liu
  • 13 篇 xianda hou
  • 13 篇 changhong mi
  • 13 篇 hongyan zheng
  • 13 篇 yanlin hou
  • 13 篇 zhiping huang
  • 13 篇 shuojin wang
  • 13 篇 jian ding
  • 13 篇 ling lu
  • 10 篇 cao xiaochun
  • 9 篇 bao shilong
  • 8 篇 yao junfeng
  • 8 篇 junfeng yao
  • 7 篇 weixing xie
  • 6 篇 zheng baihua
  • 6 篇 zhou yanwei
  • 5 篇 wen ji-rong

语言

  • 244 篇 英文
  • 20 篇 其他
  • 2 篇 中文
检索条件"机构=Key Laboratory of Data Protection and Intelligent Management"
266 条 记 录,以下是91-100 订阅
排序:
Network Alignment
arXiv
收藏 引用
arXiv 2025年
作者: Tang, Rui Yong, Ziyun Jiang, Shuyu Chen, Xingshu Liu, Yaofang Zhang, Yi-Cheng Sun, Gui-Quan Wang, Wei School of Cyber Science and Engineering Sichuan University Chengdu610065 China Cyber Science Research Institute Sichuan University Chengdu610065 China Key Laboratory of Data Protection and Intelligent Management Ministry of Education Sichuan University Chengdu610065 China Department of Reproductive Technology The Affiliated Hospital of Southwest Medical University Luzhou646000 China Physics Department University of Fribourg Chemin du Musée 3 Fribourg1700 Switzerland Sino-Europe Complex Science Center School of Mathematics North University of China Shanxi Taiyuan030051 China Complex Systems Research Center Shanxi University Shanxi Taiyuan030006 China School of Public Health Chongqing Medical University Chongqing400016 China
Complex networks are frequently employed to model physical or virtual complex systems. When certain entities exist across multiple systems simultaneously, unveiling their corresponding relationships across the network... 详细信息
来源: 评论
A Multi-Stream Structure-Enhanced Network for Mesh Denoising
A Multi-Stream Structure-Enhanced Network for Mesh Denoising
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Yutian Yang Lingyu Liang Jie Yan Yong Xu South China University of Technology Guangzhou China Henan Key Laboratory of Chronic Disease Prevention and Therapy & Intelligent Health Management Henan China Guangdong Provincial Key Laboratory of Multimodal Big Data Intelligent Analysis China
Triangular meshes provide an efficient representation of 3D shapes. Various applications such as 3D simulation suffer from degradation in geometric quality. This paper proposes a novel Multi-stream Structure-Enhanced ... 详细信息
来源: 评论
SE-Chain:A Scalable Storage and Efficient Retrieval Model for Blockchain
收藏 引用
Journal of Computer Science & Technology 2021年 第3期36卷 693-706页
作者: Da-Yu Jia Jun-Chang Xin Zhi-Qiong Wang Han Lei Guo-Ren Wang School of Computer Science and Engineering Northeastern UniversityShenyang 110819China Key Laboratory of Big Data Management and Analytics of Liaoning Province Shenyang 110819China College of Medicine and Biological Information Engineering Northeastern UniversityShenyang 110169China Neusoft Institute of Intelligent Healthcare Technology Co.Ltd. Shenyang 110179China School of Electrical and Electronic Engineering Nanyang Technological UniversitySingapore 639798Singapore School of Computer Science and Technology Beijing Institute of TechnologyBeijing 100081China
Massive data is written to blockchain systems for the destination of keeping safe. However, existing blockchain protocols still demand that each full node has to contain the entire chain. Most nodes quit because they ... 详细信息
来源: 评论
Learning Representation for Clustering via Dual Correlation  6
Learning Representation for Clustering via Dual Correlation
收藏 引用
6th IEEE Information Technology, Networking, Electronic and Automation Control Conference, ITNEC 2023
作者: Zhang, Tao Hu, Mingming Shenyang Institute of Automation Chinese Academy of Sciences State Key Laboratory of Robotics Shenyang China University of Chinese Academy of Sciences Chinese Academy of Sciences Institutes for Robotics and Intelligent Manufacturing Shenyang Institute of Automation Shenyang China Center for Clinical Studies Data Management Department Beijing China
Contrastive learning is a self-supervised learning method used to learn the general features of a dataset without labels by letting the model learn which data points are similar or different. It constructs labeled sam... 详细信息
来源: 评论
Reconfiguration of the brain during aesthetic experience on Chinese calligraphy—Using brain complex networks
收藏 引用
Visual Informatics 2022年 第1期6卷 35-46页
作者: Rui Li Xiaofei Jia Changle Zhou Junsong Zhang National Engineering Laboratory for Educational Big Data Central China Normal UniversityWuhanHubeiChina Mind Art&Computation GroupDepartment of Artificial IntelligenceSchool of InformaticsXiamen UniversityChina Key Laboratory of Digital Protection and Intelligent Processing of Intangible Cultural Heritage of Fujian and Taiwan Ministry of Culture and TourismChina Center for the Study of Brain and Language Qufu Normal UniversityRizhaoChina Faculty of Education The Edmond J.Safra Brain Research Center for the Study of Learning DisabilitiesUniversity of HaifaHaifaIsrael
Chinese calligraphy,as a well-known performing art form,occupies an important role in the intangible cultural heritage of *** studies focused on the psychophysiological benefits of Chinese *** attention has been paid ... 详细信息
来源: 评论
Target detection method based on deep learning applied in integrity evaluation of explosion proof electrical equipment
Target detection method based on deep learning applied in in...
收藏 引用
2022 International Conference on Cyber Security, Artificial Intelligence, and Digital Economy, CSAIDE 2022
作者: Li, Bohan Liu, Weijing Lin, Yuchen Lin, Tao School of Artificial Intelligence and Data Sciences Hebei University of Technology Tianjin300130 China Tianjin Key Laboratory of Aerospace Intelligent Equipment Technology Tianjin Institute of Aerospace Mechanical and Electrical Equipment Tianjin300130 China School of Economics and Management Hebei University of Technology Tianjin300130 China
There are many types of explosion-proof equipment, so the problems in use are not the same. In view of these situations, this project takes the explosion-proof electrical equipment as the research object, and develops... 详细信息
来源: 评论
ReZG: Retrieval-Augmented Zero-Shot Counter Narrative Generation for Hate Speech
arXiv
收藏 引用
arXiv 2023年
作者: Jiang, Shuyu Tang, Wenyi Chen, Xingshu Tang, Rui Wang, Haizhou Wang, Wenxian School of Cyber Science and Engineering Sichuan University Chengdu China Cyber Science Research Institute Sichuan University Chengdu China Key Laboratory of Data Protection and Intelligent Management Sichuan University Ministry of Education Chengdu China
The proliferation of hate speech (HS) on social media poses a serious threat to societal security. Automatic counter narrative (CN) generation, as an active strategy for HS intervention, has garnered increasing attent... 详细信息
来源: 评论
GPTCN: Gated Parallel Transformer Convolutional Networks for Downstream-Task User Representation Learning on App Usage
GPTCN: Gated Parallel Transformer Convolutional Networks for...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yingjie Sun Fanrui Zeng Jiamin Xiao Yuxiao Deng Yifan Ding Yizhou Li School of Cyber Science and Engineering Sichuan University Chengdu China Key Laboratory of Data Protection and Intelligent Management Ministry of Education Sichuan University Shenzhen Hexun Huagu Information Technology Co. Ltd Shanghai China
With the development of mobile applications into a part of modern life, the user usage behavior data of mobile applications can well reflect the attribute characteristics of users. For many downstream applications, in...
来源: 评论
Prompt Packer: Deceiving LLMs through Compositional Instruction with Hidden Attacks
arXiv
收藏 引用
arXiv 2023年
作者: Jiang, Shuyu Chen, Xingshu Tang, Rui School of Cyber Science and Engineering Sichuan University Chengdu China Cyber Science Research Institute Sichuan University Chengdu China Key Laboratory of Data Protection and Intelligent Management Ministry of Education Sichuan University Chengdu China
Recently, Large language models (LLMs) with powerful general capabilities have been increasingly integrated into various Web applications, while undergoing alignment training to ensure that the generated content align... 详细信息
来源: 评论
Analysis of conditional connectivity based on two lanes for VANETs  12th
Analysis of conditional connectivity based on two lanes for ...
收藏 引用
12th International Conference on Communications and Networking in China, CHINACOM 2017
作者: Pan, Bin Wu, Hao State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing100044 China School of Electronic and Information Engineering Beijing Jiaotong University Beijing100044 China Beijing Key Laboratory of Intelligent Traffic Data Safety and Privacy Protection Technology Beijing Jiaotong University Beijing100044 China Beijing Engineering Research Center of High-Speed Railway Broadband Mobile Communications Beijing Jiaotong University Beijing100044 China
Conditional connectivity is important for the design of the upper layer communication protocol and the network deployment in different scenarios. This paper analyzes the performance of conditional connectivity with th... 详细信息
来源: 评论