咨询与建议

限定检索结果

文献类型

  • 3,544 篇 期刊文献
  • 3,246 篇 会议
  • 4 册 图书

馆藏范围

  • 6,794 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,555 篇 工学
    • 3,189 篇 计算机科学与技术...
    • 2,667 篇 软件工程
    • 1,064 篇 信息与通信工程
    • 627 篇 电气工程
    • 586 篇 生物工程
    • 543 篇 控制科学与工程
    • 432 篇 电子科学与技术(可...
    • 385 篇 生物医学工程(可授...
    • 383 篇 光学工程
    • 337 篇 机械工程
    • 273 篇 化学工程与技术
    • 175 篇 交通运输工程
    • 168 篇 仪器科学与技术
    • 150 篇 材料科学与工程(可...
    • 147 篇 动力工程及工程热...
    • 125 篇 网络空间安全
    • 120 篇 安全科学与工程
  • 2,699 篇 理学
    • 1,486 篇 数学
    • 681 篇 物理学
    • 663 篇 生物学
    • 459 篇 统计学(可授理学、...
    • 294 篇 化学
    • 203 篇 系统科学
  • 1,226 篇 管理学
    • 674 篇 管理科学与工程(可...
    • 600 篇 图书情报与档案管...
    • 245 篇 工商管理
  • 322 篇 医学
    • 275 篇 临床医学
    • 235 篇 基础医学(可授医学...
    • 158 篇 药学(可授医学、理...
  • 183 篇 法学
    • 144 篇 社会学
  • 90 篇 经济学
  • 84 篇 农学
  • 61 篇 教育学
  • 27 篇 文学
  • 10 篇 军事学
  • 8 篇 艺术学
  • 4 篇 哲学

主题

  • 256 篇 feature extracti...
  • 217 篇 semantics
  • 172 篇 training
  • 161 篇 deep learning
  • 125 篇 computational mo...
  • 105 篇 accuracy
  • 102 篇 machine learning
  • 91 篇 convolution
  • 89 篇 data models
  • 88 篇 predictive model...
  • 80 篇 image segmentati...
  • 79 篇 neural networks
  • 76 篇 optimization
  • 74 篇 data mining
  • 72 篇 graph neural net...
  • 71 篇 visualization
  • 70 篇 contrastive lear...
  • 68 篇 object detection
  • 68 篇 federated learni...
  • 67 篇 task analysis

机构

  • 224 篇 university of ch...
  • 176 篇 key laboratory o...
  • 133 篇 shandong provinc...
  • 130 篇 school of inform...
  • 93 篇 school of data a...
  • 86 篇 peng cheng labor...
  • 79 篇 college of compu...
  • 73 篇 shandong provinc...
  • 69 篇 key laboratory o...
  • 64 篇 school of comput...
  • 64 篇 shandong provinc...
  • 63 篇 cas key laborato...
  • 62 篇 school of comput...
  • 62 篇 college of compu...
  • 55 篇 college of mathe...
  • 54 篇 school of comput...
  • 54 篇 beijing advanced...
  • 48 篇 school of comput...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...

作者

  • 90 篇 niyato dusit
  • 88 篇 cheng xueqi
  • 53 篇 huang qingming
  • 45 篇 guo jiafeng
  • 40 篇 zhao hai
  • 35 篇 zheng wei-shi
  • 35 篇 feng zhiquan
  • 34 篇 yang bo
  • 32 篇 wang guoyin
  • 31 篇 liu yang
  • 31 篇 chen yanping
  • 29 篇 shen huawei
  • 29 篇 wang wei
  • 29 篇 xu xiaolong
  • 28 篇 lu bao-liang
  • 28 篇 jin xiaolong
  • 28 篇 jiang kai
  • 27 篇 zhang lei
  • 27 篇 yang yang
  • 26 篇 li di

语言

  • 6,291 篇 英文
  • 405 篇 其他
  • 118 篇 中文
  • 2 篇 葡萄牙文
  • 1 篇 荷兰文
检索条件"机构=Key Laboratory of Data Science and Intelligent Computing"
6794 条 记 录,以下是221-230 订阅
排序:
Seg-diffusion: Text-to-Image Diffusion Model for Open-Vocabulary Semantic Segmentation
Seg-diffusion: Text-to-Image Diffusion Model for Open-Vocabu...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Shuo Zhang Jiaming Huang Yan Wu Tao Hu Wenbing Tang Jing Liu Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai China Huolala Shenzhen China College of Computing and Data Science Nanyang Technological University Singapore
Open-vocabulary semantic segmentation (OVSS) is a challenging computer vision task that labels each pixel within an image based on text descriptions. Recent advancements in OVSS are largely attributed to the increased... 详细信息
来源: 评论
FragMangro: A cross-domain zero-shot model for monitoring fragmented mangrove ecosystems
收藏 引用
Journal of King Saud University - Computer and Information sciences 2025年 第4期37卷 1-22页
作者: Zhang, Ruoxin An, Angela Cen, Mingcan Zhang, Chong Huangfu, Aimee Vinnakota, Sunny Song, Shuxiang Guangxi Key Laboratory of Brain-Inspired Computing and Intelligent Chips School of Electronic and Information Engineering Guangxi Normal University Guilin 541004 China Key Laboratory of Integrated Circuits and Microsystems (Guangxi Normal University) Education Department of Guangxi Zhuang Autonomous Region Guilin 541004 China Faculty of Science Engineering and Built Environment Deakin University Geelong VIC Australia Academies Australasia Polytechnic 628 Bourke Street Melbourne 3000 Australia
Monitoring fragmented mangrove ecosystems presents significant challenges due to their sparse distribution and the limitations of traditional detection methods, which often suffer from poor convergence and high rates ... 详细信息
来源: 评论
AAMB: a cross-domain identity authentication scheme based on multilayered blockchains in IoMT
收藏 引用
Journal of Supercomputing 2025年 第7期81卷 1-39页
作者: Zhang, Zheqing Li, Hongzhi Li, Dun Li, Kuan-Ching College of Big Data and Artificial Intelligence Chizhou University Chizhou247000 China Anhui Provincial Joint Construction Key Laboratory of Intelligent Education Equipment and Technology Chizhou247000 China Department of Industrial Engineering Tsinghua University Beijing China Department of Computer Science and Information Engineering Providence University Taichung City Taiwan
The internet of medical things (IoMT) integrates various sensors, smart devices, and fully utilizes medical data to provide high-quality medical services through the Internet of Things (IoT). Smart medical devices can... 详细信息
来源: 评论
AutoMiner: Reinforcement Learning-Based Mining Attack Simulator  24th
AutoMiner: Reinforcement Learning-Based Mining Attack Simula...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Li, Wei Xue, Lide Han, Ziyang Chen, Bingren Zhang, Xishan Zhou, Xuehai University of Science and Technology of China Hefei China ShangHai Municipal Big Data Center Shanghai China Anban Tech Co. Shanghai China State Key Laboratory of Processor Technologies Institute of Computing Technology Chinese Academy of Sciences Beijing China Cambricon Technologies Beijing China
As blockchain technology rapidly advances, it faces significant security threats from attacks like selfish mining, which exploit consensus algorithm vulnerabilities, undermining system security. Traditional analysis m... 详细信息
来源: 评论
POINTERGUESS: targeted password guessing model using pointer mechanism  24
POINTERGUESS: targeted password guessing model using pointer...
收藏 引用
Proceedings of the 33rd USENIX Conference on Security Symposium
作者: Kedong Xiu Ding Wang College of Cyber Science Nankai University Tianjin China and Key Laboratory of Data and Intelligent System Security (NKU) Ministry of Education Tianjin China and Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin China
Most existing targeted password guessing models view users' reuse behaviors as sequences of edit operations (e.g., insert and delete) performed on old passwords. These atomic edit operations are limited to modifyi...
来源: 评论
Multi-Grained Feature Pruning for Video-Based Human Pose Estimation
Multi-Grained Feature Pruning for Video-Based Human Pose Est...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Wang, Zhigang Fan, Shaojing Liu, Zhenguang Wu, Zheqi Wu, Sifan Jiao, Yingying College of Computer Science and Technology Zhejiang Gongshang University Hangzhou China School of Computing National University of Singapore Singapore The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Institute of Blockchain and Data Security Hangzhou China College of Computer Science and Technology Jilin University Changchun China College of Computer Science and Technology Zhejiang University of Technology Hangzhou China
Human pose estimation, with its broad applications in action recognition and motion capture, has experienced significant advancements. However, current Transformer-based methods for video pose estimation often face ch... 详细信息
来源: 评论
TASK ARITHMETIC IN TRUST REGION: A TRAINING-FREE MODEL MERGING APPROACH TO NAVIGATE KNOWLEDGE CONFLICTS
arXiv
收藏 引用
arXiv 2025年
作者: Sun, Wenju Li, Qingyong Wang, Wen Geng, Yangli-Ao Li, Boyang Key Laboratory of Big Data & Artificial Intelligence in Transportation Beijing Jiaotong University Beijing100044 China College of Computing and Data Science Nanyang Technological University 639798 Singapore
Multi-task model merging offers an efficient solution for integrating knowledge from multiple fine-tuned models, mitigating the significant computational and storage demands associated with multi-task training. As a k... 详细信息
来源: 评论
RS‐YOLOX: A High Precision Detector for Object Detection in Satellite Remote Sensing Images
arXiv
收藏 引用
arXiv 2025年
作者: Yang, Lei Yuan, Guowu Zhou, Hao Liu, Hongyu Chen, Jian Wu, Hao School of Information Science and Engineering Yunnan University Kunming650504 China Yunnan Key Laboratory of Intelligent Systems and Computing Kunming650504 China
Automatic object detection by satellite remote sensing images is of great significance for resource exploration and natural disaster assessment. To solve existing problems in remote sensing image detection, this artic... 详细信息
来源: 评论
Using Depth-Enhanced Spatial Transformation for Student Gaze Target Estimation in Dual-View Classroom Images
Using Depth-Enhanced Spatial Transformation for Student Gaze...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Miao, Haonan Zhao, Peizheng Sun, Yuqi Nan, Fang Zhang, Xiaolong Wu, Yaqiang Tian, Feng School of Computer Science and Technology Xi'an Jiaotong University Xi'an710049 China Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an710049 China School of Advanced Technology Xi'an Jiaotong-Liverpool University Suzhou215123 China Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi'an Jiaotong University Xi'an710049 China
Dual-view gaze target estimation in classroom environments has not been thoroughly explored. Existing methods lack consideration of depth information, primarily focusing on 2D image information and neglecting the late... 详细信息
来源: 评论
Show Me Your Code! Kill Code Poisoning: A Lightweight Method Based on Code Naturalness
arXiv
收藏 引用
arXiv 2025年
作者: Sun, Weisong Chen, Yuchen Yuan, Mengzhe Fang, Chunrong Chen, Zhenpeng Wang, Chong Liu, Yang Xu, Baowen Chen, Zhenyu College of Computing and Data Science Nanyang Technological University Singapore State Key Laboratory for Novel Software Technology Nanjing University Nanjing China
Neural code models (NCMs) have demonstrated extraordinary capabilities in code intelligence tasks. Meanwhile, the security of NCMs and NCMs-based systems has garnered increasing attention. In particular, NCMs are ofte... 详细信息
来源: 评论