咨询与建议

限定检索结果

文献类型

  • 90 篇 期刊文献
  • 63 篇 会议

馆藏范围

  • 153 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 103 篇 工学
    • 73 篇 计算机科学与技术...
    • 64 篇 软件工程
    • 22 篇 电气工程
    • 16 篇 信息与通信工程
    • 13 篇 电子科学与技术(可...
    • 13 篇 控制科学与工程
    • 12 篇 生物工程
    • 8 篇 机械工程
    • 6 篇 光学工程
    • 6 篇 化学工程与技术
    • 6 篇 交通运输工程
    • 5 篇 力学(可授工学、理...
    • 5 篇 仪器科学与技术
    • 5 篇 生物医学工程(可授...
    • 5 篇 网络空间安全
    • 4 篇 材料科学与工程(可...
    • 4 篇 动力工程及工程热...
    • 4 篇 环境科学与工程(可...
  • 61 篇 理学
    • 31 篇 数学
    • 17 篇 物理学
    • 16 篇 生物学
    • 13 篇 统计学(可授理学、...
    • 10 篇 系统科学
    • 3 篇 化学
  • 26 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 9 篇 图书情报与档案管...
  • 6 篇 医学
    • 6 篇 基础医学(可授医学...
    • 6 篇 临床医学
    • 4 篇 公共卫生与预防医...
  • 3 篇 教育学
    • 3 篇 教育学
  • 2 篇 农学
  • 1 篇 经济学
  • 1 篇 法学
  • 1 篇 军事学

主题

  • 7 篇 accuracy
  • 5 篇 graph neural net...
  • 5 篇 computational mo...
  • 5 篇 predictive model...
  • 5 篇 feature extracti...
  • 5 篇 artificial intel...
  • 5 篇 data models
  • 5 篇 training
  • 4 篇 image segmentati...
  • 4 篇 convolution
  • 4 篇 federated learni...
  • 4 篇 convolutional ne...
  • 3 篇 convergence
  • 3 篇 optimization
  • 3 篇 contrastive lear...
  • 3 篇 tensors
  • 3 篇 real-time system...
  • 3 篇 prediction algor...
  • 3 篇 robustness
  • 3 篇 adaptation model...

机构

  • 11 篇 engineering rese...
  • 10 篇 school of comput...
  • 9 篇 national enginee...
  • 8 篇 manufacturing in...
  • 7 篇 anhui provincial...
  • 7 篇 university of ch...
  • 6 篇 hebei key labora...
  • 6 篇 hebei engineerin...
  • 6 篇 tangshan intelli...
  • 6 篇 college of scien...
  • 6 篇 the key laborato...
  • 6 篇 key laboratory o...
  • 5 篇 chongqing engine...
  • 4 篇 zhejiang key lab...
  • 4 篇 china high-resol...
  • 4 篇 shandong provinc...
  • 4 篇 the chongqing ke...
  • 4 篇 the school of co...
  • 4 篇 guangxi key labo...
  • 4 篇 school of comput...

作者

  • 10 篇 li ming
  • 6 篇 li tianrui
  • 5 篇 xin luo
  • 5 篇 yuan ye
  • 5 篇 shan wei
  • 4 篇 zou juan
  • 4 篇 huang xiaodi
  • 4 篇 huang changqin
  • 3 篇 ye yuan
  • 3 篇 li zhao
  • 3 篇 yang shengxiang
  • 3 篇 liu xingpeng
  • 3 篇 zhang ji
  • 3 篇 yang aimin
  • 3 篇 kong shanshan
  • 3 篇 mengchu zhou
  • 3 篇 jiande wu
  • 3 篇 xu tao
  • 3 篇 li yan
  • 3 篇 xun gong

语言

  • 137 篇 英文
  • 16 篇 其他
检索条件"机构=Key Laboratory of Intelligent Computing and Application"
153 条 记 录,以下是11-20 订阅
排序:
Long-range Brain Graph Transformer
arXiv
收藏 引用
arXiv 2025年
作者: Yu, Shuo Jin, Shan Li, Ming Sarwar, Tabinda Xia, Feng School of Computer Science and Technology Dalian University of Technology China Key Laboratory of Social Computing and Cognitive Intelligence Dalian University of Technology Ministry of Education China School of Software Dalian University of Technology China Zhejiang Institute of Optoelectronics China Zhejiang Key Laboratory of Intelligent Education Technology and Application Zhejiang Normal University China School of Computing Technologies RMIT University Australia
Understanding communication and information processing among brain regions of interest (ROIs) is highly dependent on long-range connectivity, which plays a crucial role in facilitating diverse functional neural integr... 详细信息
来源: 评论
ExpTopo: Explicit Topological Modeling for Bronchus Segmentation
ExpTopo: Explicit Topological Modeling for Bronchus Segmenta...
收藏 引用
IEEE International Symposium on Biomedical Imaging
作者: Mingyue Zhao Xiaolan Qiu S.Kevin Zhou Division of Life Sciences and Medicine School of Biomedical Engineering University of Science and Technology of China (USTC) China Center for Medical Imaging Robotics Analytic Computing & Learning (MIRACLE) Suzhou Institute for Advance Research USTC China Suzhou Key Laboratory of Microwave Imaging Processing and Application Technology Suzhou Aerospace Information Research Institute China Key Laboratory of Precision and Intelligent Chemistry University of Science and Technology of China (USTC) China Key Laboratory of Intelligent Information Processing of Chinese Academy of Sciences (CAS) Institute of Computing Technology China
Airway extraction is paramount in the early diagnosis and treatment of respiratory diseases. As a tree-like structure, both topological-aware learning and voxel-wise classification are equally crucial for the airway. ... 详细信息
来源: 评论
LLM Knows Geometry Better than Algebra: Numerical Understanding of LLM-Based Agents in A Trading Arena
arXiv
收藏 引用
arXiv 2025年
作者: Ma, Tianmi Du, Jiawei Huang, Wenxin Wang, Wenjie Xie, Liang Zhong, Xian Zhou, Joey Tianyi Hubei Key Laboratory of Transportation Internet of Things Wuhan University of Technology China Hubei Key Laboratory of Big Data Intelligent Analysis and Application Hubei University China Centre for Frontier AI Research Agency for Science Technology and Research Singapore Institute of High Performance Computing Agency for Science Technology and Research Singapore School of Computing National University of Singapore Singapore School of Science Wuhan University of Technology China
Recent advancements in large language models (LLMs) have significantly improved performance in natural language processing tasks. However, their ability to generalize to dynamic, unseen tasks, particularly in numerica... 详细信息
来源: 评论
Single-cell technologies: current and near future
收藏 引用
Science China(Life Sciences) 2025年 第1期68卷 1-4页
作者: Chenfei Wang Qi Liu Xiaohui Fan Tieliu Shi KeyLaboratory of Spine and Spinal CordInjury Repairand Regeneration Ministry of EducationOrthopedics DepartmentTongji HospitalBioinformatics DepartmentSchoolofLifeSciencesandTechnologyTongji UniversityShanghai 200082China Frontier Science Center for Stem Cells School of Life Sciences and TechnologyTongji UniversityShanghai 200092China Translational Medical Center for Stem Cell Therapy and Institute for Regenerative Medicine Shanghai East HospitalBioinformatics DepartmentSchool of Life Sciences and TechnologyTongji UniversityShanghai 200082China Research Institute of Intelligent Computing Zhejiang LabHangzhou 311121China Pharmaceutical Informatics Institute College of Pharmaceutical SciencesZhejiang UniversityHangzhou 310058China National Key Laboratory of Chinese Medicine Modernization Innovation Center of Yangtze River DeltaZhejiang UniversityJiaxing 314103China Center for Bioinformatics and Computational Biology Shanghai Key Laboratory of Regulatory Biologythe Institute of Biomedical Sciences and School of Life SciencesEast China Normal UniversityShanghai 200241China Key Laboratory of Advanced Theory and Application in Statistics and Data Science(MOE) School of StatisticsEast China Normal UniversityShanghai 200062China
Single-cell technologies enable the indepth exploration of multiple biological hierarchies at the scale of individual cells,which have deepened our knowledge of cellular diversity,tissue organization,and overall organ... 详细信息
来源: 评论
Single-cell omics: experimental workflow, data analyses and applications
收藏 引用
Science China(Life Sciences) 2025年 第1期68卷 5-102页
作者: Fengying Sun Haoyan Li Dongqing Sun Shaliu Fu Lei Gu Xin Shao Qinqin Wang Xin Dong Bin Duan Feiyang Xing Jun Wu Minmin Xiao Fangqing Zhao Jing-Dong J.Han Qi Liu Xiaohui Fan Chen Li Chenfei Wang Tieliu Shi Department of Clinical Laboratory the Affiliated Wuhu Hospital of East China Normal University(The Second People’s Hospital of Wuhu City)Wuhu 241000China Pharmaceutical Informatics Institute College of Pharmaceutical SciencesZhejiang UniversityHangzhou 310058China Key Laboratory of Spine and Spinal Cord Injury Repair and Regeneration(Tongji University) Ministry of EducationOrthopaedic DepartmentTongji HospitalBioinformatics DepartmentSchool of Life Sciences and TechnologyTongji UniversityShanghai 200082China Frontier Science Center for Stem Cells School of Life Sciences and TechnologyTongji UniversityShanghai 200092China Translational Medical Center for Stem Cell Therapy and Institute for Regenerative Medicine Shanghai East HospitalBioinformatics DepartmentSchool of Life Sciences and TechnologyTongji UniversityShanghai 200082China Research Institute of Intelligent Computing Zhejiang LabHangzhou 311121China Shanghai Research Institute for Intelligent Autonomous Systems Shanghai 201210China Center for Single-cell Omics School of Public HealthShanghai Jiao Tong University School of MedicineShanghai 200025China National Key Laboratory of Chinese Medicine Modernization Innovation Center of Yangtze River DeltaZhejiang UniversityJiaxing 314103China Center for Bioinformatics and Computational Biology Shanghai Key Laboratory of Regulatory Biologythe Institute of Biomedical Sciences and School of Life SciencesEast China Normal UniversityShanghai 200241China Beijing Institutes of Life Science Chinese Academy of SciencesBeijing 100101China Peking-Tsinghua Center for Life Sciences Academy for Advanced Interdisciplinary StudiesCenter for Quantitative Biology(CQB)Peking UniversityBeijing 100871China Zhejiang Key Laboratory of Precision Diagnosis and Therapy for Major Gynecological Diseases Women’s HospitalZhejiang University School of MedicineHangzhou 310006China Key Laboratory of Advanced Theory and Application in Statistics and Data Science-MOE School of StatisticsEast China Normal U
Cells are the fundamental units of biological systems and exhibit unique development trajectories and molecular *** exploration of how the genomes orchestrate the formation and maintenance of each cell,and control the... 详细信息
来源: 评论
Provably Secure Authenticated key-Management Mechanism for e-Healthcare Environment
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Ghaffar, Zahid Xie, Yong Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Douliu64002 Taiwan Qinghai Institute of Technology School of Computer and Information Science China Qinghai Provincial Laboratory for Intelligent Computing and Application China Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan250353 China
The Internet of Things (IoT) is rapidly permeating all aspects of human life, involving a network of devices that share sensitive data. A notable application is the e-healthcare systems, which employ connected sensors... 详细信息
来源: 评论
A Unified Framework for Exploratory Learning-Aided Community Detection Under Topological Uncertainty
收藏 引用
IEEE Transactions on Network Science and Engineering 2025年
作者: Hou, Yu Tran, Cong Li, Ming Shin, Won-Yong Yonsei University School of Mathematics and Computing Computational Science and Engineering Seoul03722 Korea Republic of Posts and Telecommunications Institute of Technology Faculty of Information Technology Hanoi100000 Viet Nam Zhejiang Institute of Optoelectronics Jinhua321004 China Zhejiang Normal University Zhejiang Key Laboratory of Intelligent Education Technology and Application Jinhua321004 China Graduate School of Artificial Intelligence Pohang37673 Korea Republic of
In social networks, the discovery of community structures has received considerable attention as a fundamental problem in various network analysis tasks. However, due to privacy concerns or access restrictions, the ne... 详细信息
来源: 评论
Modeling Fine-Grained Relations in Dynamic Space-Time Graphs for Video-Based Facial Expression Recognition
收藏 引用
IEEE Transactions on Affective computing 2025年
作者: Huang, Changqin Jiang, Fan Han, Zhongmei Huang, Xiaodi Wang, Shijin Zhu, Yanlai Jiang, Yunliang Hu, Bin Zhejiang Normal University Key Laboratory of Intelligent Education Technology and Application of Zhejiang Province Zhejiang Jinhua321004 China Charles Sturt University School of Computing Mathematics and Engineering AlburyNSW2640 Australia State Key Laboratory of Cognitive Intelligence Anhui Hefei230088 China Hangzhou Hikvision Digital Technology Co. Ltd Education Business Department Hangzhou310051 China Zhejiang Normal University School of Computer Science and Technology Jinhua321004 China Beijing Institute of Technology School of Medical Technology Beijing10081 China
Facial expressions in videos inherently mirror the dynamic nature of real-world facial events. Consequently, facial expression recognition (FER) should employ a dynamic graph-based representation to effectively captur... 详细信息
来源: 评论
Adaptive Backdoor Attacks with Reasonable Constraints on Graph Neural Networks
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Dong, Xuewen Li, Jiachen Li, Shujun You, Zhichao Qu, Qiang Kholodov, Yaroslav Shen, Yulong The School of Computer Science and Technology Xidian University The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education China The Shaanxi Key Laboratory of Blockchain and Secure Computing Xi’an710071 China The School of Computing Kent Interdisciplinary Research Centre in Cyber Security University of Kent CanterburyCT2 7NF United Kingdom Shenzhen Institute of Advanced Technology Chinese Academy of Sciences China The Intelligent Transportation Systems Lab Innopolis University Innopolis Russia The School of Computer Science and Technology Xidian University China
Recent studies show that graph neural networks (GNNs) are vulnerable to backdoor attacks. Existing backdoor attacks against GNNs use fixed-pattern triggers and lack reasonable trigger constraints, overlooking individu... 详细信息
来源: 评论
Adaptive Backdoor Attacks with Reasonable Constraints on Graph Neural Networks
arXiv
收藏 引用
arXiv 2025年
作者: Dong, Xuewen Li, Jiachen Li, Shujun You, Zhichao Qu, Qiang Kholodov, Yaroslav Shen, Yulong School of Computer Science and Technology Xidian University The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education China The Shaanxi Key Laboratory of Blockchain and Secure Computing Xi’an710071 China University of Kent CanterburyCT2 7NP United Kingdom Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences China Intelligent Transportation Systems Lab Innopolis University Innopolis Russia School of Computer Science and Technology Xidian University China The Shaanxi Key Laboratory of Network and System Security Xi’an710071 China
Recent studies show that graph neural networks (GNNs) are vulnerable to backdoor attacks. Existing backdoor attacks against GNNs use fixed-pattern triggers and lack reasonable trigger constraints, overlooking individu... 详细信息
来源: 评论