咨询与建议

限定检索结果

文献类型

  • 224 篇 期刊文献
  • 164 篇 会议
  • 3 册 图书

馆藏范围

  • 391 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 248 篇 工学
    • 161 篇 计算机科学与技术...
    • 132 篇 软件工程
    • 57 篇 控制科学与工程
    • 43 篇 信息与通信工程
    • 37 篇 电气工程
    • 31 篇 电子科学与技术(可...
    • 25 篇 生物工程
    • 21 篇 机械工程
    • 18 篇 生物医学工程(可授...
    • 15 篇 光学工程
    • 14 篇 动力工程及工程热...
    • 12 篇 化学工程与技术
    • 11 篇 力学(可授工学、理...
    • 10 篇 材料科学与工程(可...
    • 10 篇 交通运输工程
    • 8 篇 仪器科学与技术
  • 146 篇 理学
    • 74 篇 数学
    • 41 篇 物理学
    • 28 篇 生物学
    • 20 篇 统计学(可授理学、...
    • 16 篇 系统科学
    • 14 篇 化学
    • 6 篇 大气科学
  • 79 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 30 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 13 篇 法学
    • 12 篇 社会学
  • 8 篇 医学
    • 8 篇 临床医学
    • 7 篇 基础医学(可授医学...
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 3 篇 农学
  • 2 篇 教育学
  • 1 篇 艺术学

主题

  • 10 篇 training
  • 9 篇 reinforcement le...
  • 8 篇 conferences
  • 8 篇 wireless sensor ...
  • 8 篇 software
  • 7 篇 software enginee...
  • 7 篇 optimization
  • 7 篇 semantics
  • 7 篇 machine learning
  • 7 篇 artificial intel...
  • 7 篇 forecasting
  • 6 篇 tools
  • 6 篇 computational mo...
  • 6 篇 feature extracti...
  • 6 篇 open source soft...
  • 5 篇 task analysis
  • 5 篇 robot sensing sy...
  • 5 篇 multi agent syst...
  • 4 篇 deep learning
  • 4 篇 image segmentati...

机构

  • 20 篇 college of compu...
  • 19 篇 key laboratory o...
  • 13 篇 college of compu...
  • 11 篇 school of electr...
  • 10 篇 college of compu...
  • 10 篇 college of compu...
  • 10 篇 state key labora...
  • 9 篇 national enginee...
  • 9 篇 department of ph...
  • 9 篇 state key labora...
  • 9 篇 college of syste...
  • 8 篇 school of comput...
  • 8 篇 the state key la...
  • 8 篇 school of comput...
  • 8 篇 key laboratory o...
  • 7 篇 national enginee...
  • 7 篇 shenzhen key lab...
  • 7 篇 guangdong labora...
  • 7 篇 college of compu...
  • 7 篇 state key labora...

作者

  • 11 篇 xinjun mao
  • 11 篇 ying-cheng lai
  • 10 篇 liang huang
  • 10 篇 guangming xie
  • 10 篇 duan zhisheng
  • 10 篇 celso grebogi
  • 10 篇 chen wang
  • 9 篇 mao xinjun
  • 8 篇 shi ling
  • 8 篇 fei-yue wang
  • 8 篇 xie guangming
  • 8 篇 wang chen
  • 8 篇 duan peihu
  • 7 篇 wang fei-yue
  • 6 篇 wei dong
  • 6 篇 yao lu
  • 6 篇 derong liu
  • 6 篇 xiaoguang mao
  • 5 篇 wan jian
  • 5 篇 zhenbang chen

语言

  • 321 篇 英文
  • 65 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Software Engineering for Complex Systems College of Computer"
391 条 记 录,以下是31-40 订阅
排序:
Multi-task Learning Based Single Temporal Remote Sensing Image Change Detection  12
Multi-task Learning Based Single Temporal Remote Sensing Ima...
收藏 引用
12th International Conference on Computing and Pattern Recognition, ICCPR 2023
作者: Yang, Peixuan Cao, Yichao Lu, Xiaobo College of Software Engineering Southeast University JiangSu NanJing China Key Laboratory of Measurement and Control of Complex Systems of Engineering Ministry of Education JiangSu NanJing China School of Automation Southeast University JiangSu NanJing China
Change Detection is a classic and fundamental task in remote sensing(RS), and has accomplish remarkable achievement on bitemporal image based methods. However, bitemporal images are very expensive and needs profession... 详细信息
来源: 评论
On the properties of kullback-leibler divergence between multivariate Gaussian distributions  23
On the properties of kullback-leibler divergence between mul...
收藏 引用
Proceedings of the 37th International Conference on Neural Information Processing systems
作者: Yufeng Zhang Jialu Pan Kenli Li Wanwei Liu Zhenbang Chen Xinwang Liu Ji Wang College of Computer Science and Electronic Engineering Hunan University Changsha China College of Computer Key Laboratory of Software Engineering for Complex Systems National University of Defense Technology Changsha China College of Computer State Key Laboratory for High Performance Computing Key laboratory of Software Engineering for Complex Systems National University of Defense Technology Changsha China
Kullback-Leibler (KL) divergence is one of the most important measures to calculate the difference between probability distributions. In this paper, we theoretically study several properties of KL divergence between m...
来源: 评论
Reversible Data Hiding With Secret Encrypted Image Sharing and Adaptive Coding
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 23933-23945页
作者: Fang, Guangtian Wang, Feng Zhao, Chenbin Qin, Chuan Chang, Ching-Chun Chang, Chin-Chen Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Fujian University of Technology College of Computer Science and Mathematics Key Laboratory of Big Data Mining and Applications Fuzhou350118 China Monash University Faculty of IT Department of Software Systems and Cybersecurity VIC3800 Australia Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Feng Chia University Information and Communication Security Research Center Taichuang 40724 Taiwan Feng Chia University Department of Information Engineering and Computer Science Taichung40724 Taiwan
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ... 详细信息
来源: 评论
Autonomous Environmental Exploration and Target Tracking Control for Unmanned Surface Vehicles in Uncertain Environment
Autonomous Environmental Exploration and Target Tracking Con...
收藏 引用
2024 IEEE International Conference on Real-Time Computing and Robotics, RCAR 2024
作者: Zhu, Kaiwei Kong, Shihan Wu, Fang Sun, Jinan Yu, Junzhi College of Engineering Peking University State Key Laboratory for Turbulence and Complex Systems Department of Advanced Manufacturing and Robotics Beijing100871 China SPIC Nuclear Energy Co. Ltd. China Peking University National Engineering Research Center for Software Engineering Beijing100871 China
In this paper, a set of methods of autonomous obstacle exploration, avoiding, and target-tracking control in the uncertain environment is proposed. First, a secure and reliable obstacle exploration framework via multi... 详细信息
来源: 评论
Generating Targeted Universal Adversarial Perturbation against Automatic Speech Recognition via Phoneme Tailoring
Generating Targeted Universal Adversarial Perturbation again...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Zhang, Yujun Chen, Yanqu Wang, Jiakai Hu, Jin Tao, Renshuai Liu, Xianglong State Key Laboratory of Complex & Critical Software Environment Beihang University China School of Computer Science and Engineering Beihang University China College of Computer Science Beijing University of Technology China Zhongguancun Laboratory China School of Computer and Information Technology Beijing Jiaotong University China Institute of Data Space Hefei Comprehensive National Science Center China
There is a growing concern about adversarial attacks against automatic speech recognition (ASR) systems. Although research into targeted universal adversarial examples (AEs) has progressed, current methods are constra... 详细信息
来源: 评论
A Dynamic Selective Parameter Sharing Mechanism Embedded with Multi-Level Reasoning Abstractions  26
A Dynamic Selective Parameter Sharing Mechanism Embedded wit...
收藏 引用
26th European Conference on Artificial Intelligence, ECAI 2023
作者: Liu, Yan He, Ying Ming, Zhong Yu, F. Richard Shenzhen Key Lab of Digital & Intelligent Technologies & Systems College of Computer Science and Software Engineering Shenzhen University China State Key Laboratory of Integrated Services Networks Xidian University China Shenzhen China
Cooperative multi-agent reinforcement learning (Co-MARL) commonly employs different parameter sharing mechanisms, such as full and partial sharing. However, imprudent application of these mechanisms can potentially co... 详细信息
来源: 评论
BPH-YOLOv5: Improved yolov5 based on biformer prediction head for small target cigatette detection
BPH-YOLOv5: Improved yolov5 based on biformer prediction hea...
收藏 引用
2023 Jiangsu Annual Conference on Automation, JACA 2023
作者: Zheng, Xinyi Lu, Xiaobo College of Software Engineering Southeast University Suzhou215123 China School of Automation Southeast University Nanjing210096 China Key Laboratory of Measurement and Control of Complex Systems of Engineering Ministry of Education Southeast University Nanjing210096 China
Small object detection in the cigarette detection field is a recent popular task. As cigarette targets in surveillance are tiny, the object scale leads to a great challenge of object detection. To solve the issue ment... 详细信息
来源: 评论
SegSdetr: Harnessing supervisions in SAM with detection label for efficient smoke detection
SegSdetr: Harnessing supervisions in SAM with detection labe...
收藏 引用
2023 Jiangsu Annual Conference on Automation, JACA 2023
作者: Li, Dan Lu, Xiaobo College of Software Engineering Southeast University Suzhou215123 China School of Automation Southeast University Nanjing210096 China Key Laboratory of Measurement and Control of Complex Systems of Engineering Ministry of Education Ministry of Education Nanjing210096 China
In recent years, forest fires often result in significant environmental and economic losses, spurred researchers to investigate early forest fire detection methods. Embedded devices with the object detection task can ... 详细信息
来源: 评论
Instruct or Interact? Exploring and Eliciting LLMs' Capability in Code Snippet Adaptation Through Prompt engineering
Instruct or Interact? Exploring and Eliciting LLMs' Capabili...
收藏 引用
International Conference on software engineering (ICSE)
作者: Tanghaoran Zhang Yue Yu Xinjun Mao Shangwen Wang Kang Yang Yao Lu Zhang Zhang Yuxin Zhao College of Computer Science and Technology National University of Defense and Technology Changsha China Key Laboratory of Software Engineering for Complex System
Code snippet adaptation is a fundamental activity in the software development process. Unlike code generation, code snippet adaptation is not a “free creation”, which requires developers to tailor a given code snipp... 详细信息
来源: 评论
Large Language Models are Few-Shot Summarizers: Multi-Intent Comment Generation via In-Context Learning
Large Language Models are Few-Shot Summarizers: Multi-Intent...
收藏 引用
International Conference on software engineering (ICSE)
作者: Mingyang Geng Shangwen Wang Dezun Dong Haotian Wang Ge Li Zhi Jin Xiaoguang Mao Xiangke Liao College of Computer Science National University of Defense Technology Changsha China Key Laboratory of Software Engineering for Complex Systems Key Lab of High Confidence Software Technology Peking University Beijing China
Code comment generation aims at generating natural language descriptions for a code snippet to facilitate developers' program comprehension activities. Despite being studied for a long time, a bottleneck for exist... 详细信息
来源: 评论