咨询与建议

限定检索结果

文献类型

  • 1,808 篇 会议
  • 1,210 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 3,020 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,939 篇 工学
    • 1,343 篇 计算机科学与技术...
    • 1,132 篇 软件工程
    • 451 篇 信息与通信工程
    • 223 篇 电气工程
    • 222 篇 生物工程
    • 212 篇 控制科学与工程
    • 207 篇 电子科学与技术(可...
    • 182 篇 机械工程
    • 135 篇 光学工程
    • 120 篇 生物医学工程(可授...
    • 107 篇 化学工程与技术
    • 80 篇 仪器科学与技术
    • 69 篇 动力工程及工程热...
    • 66 篇 材料科学与工程(可...
    • 48 篇 建筑学
    • 47 篇 土木工程
    • 46 篇 网络空间安全
    • 45 篇 交通运输工程
  • 1,146 篇 理学
    • 707 篇 数学
    • 297 篇 物理学
    • 252 篇 生物学
    • 212 篇 统计学(可授理学、...
    • 112 篇 化学
    • 91 篇 系统科学
  • 548 篇 管理学
    • 290 篇 图书情报与档案管...
    • 274 篇 管理科学与工程(可...
    • 99 篇 工商管理
  • 102 篇 医学
    • 81 篇 临床医学
    • 71 篇 基础医学(可授医学...
  • 65 篇 法学
    • 51 篇 社会学
  • 46 篇 农学
  • 31 篇 经济学
  • 20 篇 教育学
  • 9 篇 哲学
  • 7 篇 艺术学
  • 6 篇 文学
  • 6 篇 军事学

主题

  • 140 篇 feature extracti...
  • 103 篇 semantics
  • 81 篇 training
  • 70 篇 information proc...
  • 63 篇 laboratories
  • 58 篇 computational mo...
  • 51 篇 data mining
  • 51 篇 computers
  • 50 篇 visualization
  • 49 篇 image segmentati...
  • 48 篇 face recognition
  • 45 篇 optimization
  • 45 篇 accuracy
  • 43 篇 deep learning
  • 41 篇 machine learning
  • 39 篇 robustness
  • 37 篇 object detection
  • 37 篇 support vector m...
  • 36 篇 humans
  • 35 篇 three-dimensiona...

机构

  • 436 篇 key laboratory o...
  • 214 篇 university of ch...
  • 191 篇 school of inform...
  • 128 篇 shandong provinc...
  • 84 篇 key laboratory o...
  • 83 篇 key laboratory o...
  • 81 篇 shandong provinc...
  • 63 篇 college of compu...
  • 62 篇 peng cheng labor...
  • 61 篇 college of mathe...
  • 48 篇 key laboratory o...
  • 45 篇 hunan provincial...
  • 45 篇 the key laborato...
  • 44 篇 college of infor...
  • 43 篇 key laboratory o...
  • 43 篇 graduate univers...
  • 42 篇 school of comput...
  • 40 篇 shandong provinc...
  • 40 篇 chinese academy ...
  • 38 篇 fujian provincia...

作者

  • 94 篇 zhongzhi shi
  • 91 篇 shi zhongzhi
  • 74 篇 xilin chen
  • 71 篇 shiguang shan
  • 62 篇 liu qun
  • 62 篇 huang qingming
  • 48 篇 li yingsong
  • 41 篇 xu qianqian
  • 40 篇 huang zhixiang
  • 40 篇 feng yang
  • 37 篇 feng zhiquan
  • 36 篇 he qing
  • 35 篇 yingsong li
  • 32 篇 wen gao
  • 31 篇 qing he
  • 29 篇 jiang kai
  • 29 篇 guo wenzhong
  • 28 篇 li hua
  • 28 篇 zhuang fuzhen
  • 28 篇 zhixiang huang

语言

  • 2,849 篇 英文
  • 101 篇 其他
  • 77 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Intelligent Information Processing"
3020 条 记 录,以下是101-110 订阅
排序:
Attention-based UAV Trajectory Optimization for Wireless Power Transfer-assisted IoT Systems
arXiv
收藏 引用
arXiv 2025年
作者: Dong, Li Jiang, Feibo Peng, Yubo School of Computer Science Hunan University of Technology and Business Changsha410205 China Xiangjiang Laboratory Changsha410205 China Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Hunan Normal University Changsha410081 China School of Intelligent Software and Engineering Nanjing University Suzhou215163 China
Unmanned Aerial Vehicles (UAVs) in Wireless Power Transfer (WPT)-assisted Internet of Things (IoT) systems face the following challenges: limited resources and suboptimal trajectory planning. Reinforcement learning-ba... 详细信息
来源: 评论
Modality Unified Attack for Omni-Modality Person Re-Identification
收藏 引用
IEEE Transactions on information Forensics and Security 2025年
作者: Bian, Yuan Liu, Min Yi, Yunqi Wang, Xueping Ma, Yunfeng Wang, Yaonan Hunan University National Engineering Research Center of Robot Visual Perception and Control Technology College of Electrical and Information Engineering Hunan Changsha China Hunan Normal University Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing College of Information Science and Engineering Hunan Changsha China
Deep learning based person re-identification (re-id) models have been widely employed in surveillance systems. Recent studies have demonstrated that black-box single-modality and cross-modality re-id models are vulner... 详细信息
来源: 评论
CGNet: Classification-Guided Multi-Task Interactive network for Hyperspectral and Multispectral Image Fusion
CGNet: Classification-Guided Multi-Task Interactive Network ...
收藏 引用
International Conference on Acoustics, Speech, and Signal processing (ICASSP)
作者: Guohua Lv Yanlong Xu Yongbiao Gao Guixin Zhao Guotao Wang Xiangcheng Sun Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science China Shandong Key Laboratory of Ubiquitous Intelligent Computing China Key Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Application (Southeast University) Ministry of Education China Beihang University Beijing China
The goal of fusing hyperspectral images (HSI) and multispectral images (MSI) is to generate high-resolution hyperspectral images for downstream tasks. However, most existing methods overlook the specific requirements ... 详细信息
来源: 评论
Unsupervised Multivariate Time Series Anomaly Detection by Feature Decoupling in Federated Learning Scenarios
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年
作者: He, Yifan Ding, Xi Tang, Yateng Guan, Jihong Zhou, Shuigeng Fudan University School of Computer Science Shanghai200433 China Shanghai Key Laboratory of Intelligent Information Processing Shanghai200433 China Tencent Weixin Group Guangzhou510308 China Tongji University Department of Computer Science and Technology Shanghai201804 China Ministry of Education Key Laboratory of Embedded System and Service Computing Tongji University Shanghai200092 China
Anomalies are usually regarded as data errors or novel patterns previously unseen, which are quite different from most observed data. Accurate detection of anomalies is crucial in various application scenarios. This p... 详细信息
来源: 评论
Multi-agent Collaboration for Vehicular Task Offloading Using Federated Deep Reinforcement Learning
收藏 引用
IEEE Transactions on Mobile computing 2025年
作者: Chen, Xing Xiao, Bohuai Lin, Xinyu Chen, Zheyi Min, Geyong Fuzhou University College of Computer and Data Science Fuzhou350116 China Ministry of Education Engineering Research Center of Big Data Intelligence Fuzhou350002 China Fuzhou University Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou350116 China University of Exeter Department of Computer Science ExeterEX4 4QF United Kingdom
Mobile Edge computing (MEC) distributes resources such as computing, storage, and bandwidth to the side close to users, which can provide low-latency services to in-vehicle users, thus promising a more efficient and s... 详细信息
来源: 评论
SolBERT: Advancing solidity smart contract similarity analysis via self-supervised pre-training and contrastive fine-tuning
收藏 引用
information and Software Technology 2025年 184卷
作者: Tian, Zhenzhou Teng, Yudong Ke, Xianqun Chen, Yanping Chen, Lingwei School of Computer Science and Technology Xi'an University of Posts and Telecommunications Shaanxi Xi'an710121 China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi'an University of Posts and Telecommunications Shaanxi Xi'an710121 China Xi'an Key Laboratory of Big Data and Intelligent Computing Xi'an University of Posts and Telecommunications Shaanxi Xi'an710121 China Department of Computer Science and Engineering Wright State University DaytonOH45435 United States
Context: Reliable and effective similarity analysis for the smart contracts facilitates the maintenance and quality assurance of the smart contract ecosystem. However, existing signature-based methods and code represe... 详细信息
来源: 评论
Comprehensive Feature processing Based on Attention Mechanism for Co-Salient Object Detection
Comprehensive Feature Processing Based on Attention Mechanis...
收藏 引用
International Conference on Acoustics, Speech, and Signal processing (ICASSP)
作者: Guohua Lv Mao Yuan Zengbin Zhang Zhengyang Zhang Zhenhui Ding Guangxiao Ma Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Shandong Key Laboratory of Ubiquitous Intelligent Computing Jinan China College of Computer Science and Engineering Shandong University of Science and Technology Qingdao China
Co-salient object detection (CoSOD) aims to detect common salient objects across multiple related images. However, existing methods often struggle with limited attention coverage, missing some co-salient objects. To a... 详细信息
来源: 评论
Provably Secure Authenticated key-Management Mechanism for e-Healthcare Environment
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Ghaffar, Zahid Xie, Yong Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Douliu64002 Taiwan Qinghai Institute of Technology School of Computer and Information Science China Qinghai Provincial Laboratory for Intelligent Computing and Application China Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan250353 China
The Internet of Things (IoT) is rapidly permeating all aspects of human life, involving a network of devices that share sensitive data. A notable application is the e-healthcare systems, which employ connected sensors... 详细信息
来源: 评论
PostoMETRO: Pose Token Enhanced Mesh Transformer for Robust 3D Human Mesh Recovery
PostoMETRO: Pose Token Enhanced Mesh Transformer for Robust ...
收藏 引用
IEEE Workshop on Applications of Computer Vision (WACV)
作者: Wendi Yang Zihang Jiang Shang Zhao S. Kevin Zhou Division of Life Sciences and Medicine School of Biomedical Engineering University of Science and Technology of China (USTC) Hefei Anhui China Center for Medical Imaging Robotics Analytic Computing & Learning (MIRACLE) Suzhou Institute for Advance Research USTC Suzhou Jiangsu China Key Laboratory of Precision and Intelligent Chemistry USTC Hefei Anhui China Key Laboratory of Intelligent Information Processing of Chinese Academy of Sciences (CAS) Institute of Computing Technology CAS
With the recent advancements in single-image-based 3D human pose and shape estimation (3DHPSE), there is a growing amount of works that can achieve good results on standard benchmarks but struggle to yield accurate hu... 详细信息
来源: 评论
Exploiting Robust Model Watermarking Against the Model Fine-Tuning Attack via Flat Minima Aware Optimizers
Exploiting Robust Model Watermarking Against the Model Fine-...
收藏 引用
International Conference on Acoustics, Speech, and Signal processing (ICASSP)
作者: Dongdong Lin Yue Li Bin Li Jiwu Huang Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen China Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen China SZU-AFS Joint Innovation Center for AI Technology Shenzhen University Shenzhen China Xiamen Key Laboratory of Data Security and Blockchain Technology Huaqiao University Xiamen China Guangdong Laboratory of Machine Perception and Intelligent Computing Shenzhen MSU-BIT University Shenzhen China
With the rapid advancement of deep neural networks (DNNs), model watermarking has emerged as a widely adopted technique for safeguarding model copyrights. A prevalent method involves utilizing a watermark decoder to r... 详细信息
来源: 评论