咨询与建议

限定检索结果

文献类型

  • 173 篇 期刊文献
  • 88 篇 会议

馆藏范围

  • 261 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 148 篇 工学
    • 100 篇 计算机科学与技术...
    • 78 篇 软件工程
    • 35 篇 信息与通信工程
    • 23 篇 电气工程
    • 21 篇 生物工程
    • 11 篇 控制科学与工程
    • 9 篇 化学工程与技术
    • 9 篇 交通运输工程
    • 9 篇 生物医学工程(可授...
    • 8 篇 光学工程
    • 8 篇 环境科学与工程(可...
    • 6 篇 安全科学与工程
    • 6 篇 网络空间安全
    • 5 篇 机械工程
    • 4 篇 动力工程及工程热...
  • 77 篇 理学
    • 41 篇 数学
    • 24 篇 生物学
    • 9 篇 化学
    • 8 篇 物理学
    • 8 篇 系统科学
    • 8 篇 统计学(可授理学、...
  • 49 篇 管理学
    • 25 篇 管理科学与工程(可...
    • 24 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 18 篇 农学
    • 15 篇 作物学
  • 17 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
    • 7 篇 公共卫生与预防医...
  • 14 篇 法学
    • 9 篇 社会学
  • 9 篇 经济学
    • 8 篇 应用经济学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 13 篇 optimum fertiliz...
  • 13 篇 fertilizer utili...
  • 13 篇 relative abundan...
  • 13 篇 optimum yield
  • 12 篇 nutrient convers...
  • 9 篇 training
  • 7 篇 feature extracti...
  • 7 篇 data models
  • 6 篇 image segmentati...
  • 6 篇 semantics
  • 5 篇 three-dimensiona...
  • 5 篇 speech processin...
  • 5 篇 privacy
  • 4 篇 object detection
  • 4 篇 predictive model...
  • 4 篇 differential pri...
  • 4 篇 blockchains
  • 4 篇 forecasting
  • 4 篇 adaptation model...
  • 3 篇 semantic segment...

机构

  • 19 篇 school of cyber ...
  • 15 篇 school of cyber ...
  • 13 篇 school of comput...
  • 13 篇 key laboratory o...
  • 13 篇 guangxi key labo...
  • 13 篇 guangxi geograph...
  • 13 篇 agro-environment...
  • 12 篇 key laboratory o...
  • 11 篇 peng cheng labor...
  • 11 篇 key laboratory o...
  • 10 篇 national institu...
  • 10 篇 south china univ...
  • 9 篇 key lab. of inte...
  • 9 篇 school of comput...
  • 9 篇 singapore manage...
  • 9 篇 gaoling school o...
  • 9 篇 center for digit...
  • 8 篇 key laboratory o...
  • 8 篇 key laboratory o...
  • 8 篇 cyber science re...

作者

  • 23 篇 huang qingming
  • 21 篇 xu qianqian
  • 15 篇 yang zhiyong
  • 13 篇 shutian liu
  • 13 篇 xianda hou
  • 13 篇 changhong mi
  • 13 篇 hongyan zheng
  • 13 篇 yanlin hou
  • 13 篇 zhiping huang
  • 13 篇 shuojin wang
  • 13 篇 jian ding
  • 13 篇 ling lu
  • 10 篇 cao xiaochun
  • 9 篇 bao shilong
  • 9 篇 junfeng yao
  • 7 篇 yao junfeng
  • 7 篇 weixing xie
  • 6 篇 zheng baihua
  • 5 篇 wen ji-rong
  • 5 篇 xie weixing

语言

  • 241 篇 英文
  • 18 篇 其他
  • 2 篇 中文
检索条件"机构=Key Laboratory of Data Protection and Intelligent Management"
261 条 记 录,以下是111-120 订阅
排序:
Trajectory set Empowered Hypergraph Transformer for Mobile Sensor Based Traffic Prediction
Trajectory set Empowered Hypergraph Transformer for Mobile S...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Hanyuan Zhang Xinyu Zhang Qize Jiang Liang Li Baihua Zheng Weiwei Sun School of Computer Science Shanghai Key Laboratory of Data Science Fudan University Shanghai Institute of Intelligent Electronics & Systems School of Computing and Information Systems Singapore Management University
Traffic speed prediction is vital for intelligent transportation systems. However, most existing methods focus on costly static sensors. In contrast, utilizing GPS devices from vehicles as mobile sensors offers a cost...
来源: 评论
A topic guided pointer-generator model for generating natural language code summaries
arXiv
收藏 引用
arXiv 2021年
作者: Wang, Xin Peng, Xin Sun, Jun Zhao, Yifan Chen, Chi Fan, Jinkai The School of Computer Science The Shanghai Key Laboratory of Data Science Fudan University Shanghai China Shanghai Institute of Intelligent Electronics & Systems China The Singapore Management University Singapore
Code summarization is the task of generating natural language description of source code, which is important for program understanding and maintenance. Existing approaches treat the task as a machine translation probl... 详细信息
来源: 评论
Suppress Content Shift: Better Diffusion Features via Off-the-Shelf Generation Techniques  38
Suppress Content Shift: Better Diffusion Features via Off-th...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Meng, Benyuan Xu, Qianqian Wang, Zitai Yang, Zhiyong Cao, Xiaochun Huang, Qingming Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China Peng Cheng Laboratory China School of Computer Science and Tech. University of Chinese Academy of Sciences China School of Cyber Science and Tech. Shenzhen Campus of Sun Yat-sen University China Key Laboratory of Big Data Mining and Knowledge Management CAS China
Diffusion models are powerful generative models, and this capability can also be applied to discrimination. The inner activations of a pre-trained diffusion model can serve as features for discriminative tasks, namely...
来源: 评论
Not All Diffusion Model Activations Have Been Evaluated as Discriminative Features  38
Not All Diffusion Model Activations Have Been Evaluated as D...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Meng, Benyuan Xu, Qianqian Wang, Zitai Cao, Xiaochun Huang, Qingming Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China Peng Cheng Laboratory China School of Cyber Science and Tech. Shenzhen Campus of Sun Yat-sen University China School of Computer Science and Tech. University of Chinese Academy of Sciences China Key Laboratory of Big Data Mining and Knowledge Management CAS China
Diffusion models are initially designed for image generation. Recent research shows that the internal signals within their backbones, named activations, can also serve as dense features for various discriminative task...
来源: 评论
Neighborhood collaborative classifiers
Neighborhood collaborative classifiers
收藏 引用
2016 International Conference on Machine Learning and Cybernetics, ICMLC 2016
作者: Xu, Suping Yang, Xibei Tsang, Eric C. C. Mantey, Eric A. School of Computer Science and Engineering Jiangsu University of Science and Technology Zhenjiang212003 China School of Economics and Management Nanjing University of Science and Technology Nanjing210094 China Faculty of Information Technology Macau University of Science and Technology C-Macau519020 China Intelligent Information Processing Key Laboratory of Shanxi Province Shanxi University Taiyuan030006 China Key Laboratory of Oceanographic Big Data Mining and Application of Zhejiang Province Zhejiang Ocean University Zhoushan316022 China
In neighborhood rough set model, the majority rule based neighborhood classifier (NC) is easy to be misjudged with the increasing of the size of information granules. To remedy this deficiency, we propose a neighborho... 详细信息
来源: 评论
RNTrajRec: Road Network Enhanced Trajectory Recovery with Spatial-Temporal Transformer
RNTrajRec: Road Network Enhanced Trajectory Recovery with Sp...
收藏 引用
International Conference on data Engineering
作者: Yuqi Chen Hanyuan Zhang Weiwei Sun Baihua Zheng School of Computer Science & Shanghai Key Laboratory of Data Science Fudan University Shanghai Institute of Intelligent Electronics & Systems School of Computing and Information Systems Singapore Management University
GPS trajectories are the essential foundations for many trajectory-based applications. Most applications require a large number of high sample rate trajectories to achieve a good performance. However, many real-life t...
来源: 评论
A Dual-Level Cancelable Framework for Palmprint Verification and Hack-Proof data Storage
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Ziyuan Kang, Ming Teoh, Andrew Beng Jin Gao, Chengrui Chen, Wen Zhang, Bob Zhang, Yi The College of Computer Science Key Laboratory of Data Protection and Intelligent Management Ministry of Education Sichuan University Chengdu610065 China The School of Cyber Science and Engineering Sichuan University Chengdu610065 China The School of Electrical and Electronic Engineering College of Engineering Yonsei University Seoul Korea Republic of The College of Computer Science Sichuan University Chengdu610065 China The Pattern Analysis and Machine Intelligence Group Department of Computer and Information Science University of Macau Taipa China The School of Cyber Science and Engineering Key Laboratory of Data Protection and Intelligent Management Ministry of Education Sichuan University Chengdu610065 China
In recent years, palmprints have been widely used for individual verification. The rich privacy information in palmprint data necessitates its protection to ensure security and privacy without sacrificing system perfo... 详细信息
来源: 评论
Spatial fuzzy C-means clustering and deep belief network for change detection in synthetic aperture radar images  5
Spatial fuzzy C-means clustering and deep belief network for...
收藏 引用
IET International Radar Conference 2020, IET IRC 2020
作者: Qi, Wenwen Wu, Lin Guo, Zhengwei Huang, Dan College of Computer and Information Engineering Henan University Kaifeng475004 China Henan Key Laboratory of Big Data Analysis and Processing Henan University Kaifeng475004 China Henan Engineering Research Center of Intelligent Technology and Application Henan University Kaifeng475004 China College of Environment and Planning Henan University Kaifeng475004 China Department of Laboratory and Equipment Management Henan University Kaifeng475004 China
In this study, spatial fuzzy c-means (SFCM) clustering and deep belief network (DBN) method is presented for change detection in SAR images. There are three primary steps of this approach, they are given as follows: 1... 详细信息
来源: 评论
D3still: Decoupled Differential Distillation for Asymmetric Image Retrieval
D3still: Decoupled Differential Distillation for Asymmetric ...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Yi Xie Yihong Lin Wenjie Cai Xuemiao Xu Huaidong Zhang Yong Du Shengfeng He South China University of Technology Independent Researcher State Key Laboratory of Subtropical Building Science Guangdong Provincial Key Lab of Computational Intelligence and Cyberspace Information Ministry of Education Key Laboratory of Big Data and Intelligent Robot Ocean University of China Singapore Management University
Existing methods for asymmetric image retrieval employ a rigid pairwise similarity constraint between the query network and the larger gallery network. However, these one-to-one constraint approaches often fail to mai... 详细信息
来源: 评论
CroAuth: A Cross-domain Authentication Scheme based on Blockchain and Decentralized Identity
CroAuth: A Cross-domain Authentication Scheme based on Block...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Zinuo Zhang Ruoting Xiong Xinyu Di Wei Ren School of Computer Science China University of Geosciences Wuhan China School of Computer Science University of East Anglia Norwich UK International College Chongqing University of Technology Chongqing China Ministry of Education Key Laboratory of Data Protection and Intelligent Management Sichuan University Chengdu China Beijing Key Laboratory of Urban Spatial Information Engineering Beijing China
Current solutions on cross-domain access authentication based on blockchain are largely using digital certificate authentication, where users cannot control their identity, and some operations, such as certificate aut... 详细信息
来源: 评论