咨询与建议

限定检索结果

文献类型

  • 169 篇 会议
  • 88 篇 期刊文献

馆藏范围

  • 257 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 176 篇 工学
    • 130 篇 计算机科学与技术...
    • 95 篇 软件工程
    • 48 篇 信息与通信工程
    • 24 篇 控制科学与工程
    • 17 篇 电子科学与技术(可...
    • 14 篇 电气工程
    • 13 篇 机械工程
    • 8 篇 生物工程
    • 7 篇 光学工程
    • 7 篇 仪器科学与技术
    • 7 篇 航空宇航科学与技...
    • 6 篇 化学工程与技术
    • 6 篇 交通运输工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 动力工程及工程热...
    • 5 篇 网络空间安全
    • 4 篇 材料科学与工程(可...
    • 4 篇 建筑学
  • 86 篇 理学
    • 59 篇 数学
    • 16 篇 物理学
    • 16 篇 系统科学
    • 16 篇 统计学(可授理学、...
    • 13 篇 生物学
    • 7 篇 化学
  • 51 篇 管理学
    • 33 篇 管理科学与工程(可...
    • 18 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 9 篇 医学
    • 7 篇 基础医学(可授医学...
    • 7 篇 临床医学
  • 5 篇 法学
    • 5 篇 社会学
  • 3 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学

主题

  • 13 篇 computer science
  • 13 篇 laboratories
  • 13 篇 wireless sensor ...
  • 10 篇 heuristic algori...
  • 8 篇 optimization
  • 8 篇 computer network...
  • 8 篇 evolutionary com...
  • 7 篇 statistics
  • 7 篇 clustering algor...
  • 6 篇 sociology
  • 5 篇 vehicle detectio...
  • 5 篇 vectors
  • 5 篇 algorithm design...
  • 5 篇 genetic algorith...
  • 5 篇 vehicles
  • 5 篇 training
  • 4 篇 complex networks
  • 4 篇 maintenance engi...
  • 4 篇 cameras
  • 4 篇 resource managem...

机构

  • 26 篇 school of comput...
  • 24 篇 anhui province k...
  • 17 篇 anhui province k...
  • 16 篇 department of co...
  • 11 篇 hubei key labora...
  • 11 篇 school of softwa...
  • 11 篇 school of inform...
  • 11 篇 school of cyber ...
  • 10 篇 national enginee...
  • 10 篇 hubei engineerin...
  • 9 篇 school of comput...
  • 9 篇 services computi...
  • 8 篇 school of comput...
  • 8 篇 anhui province k...
  • 8 篇 anhui province k...
  • 8 篇 cluster and grid...
  • 7 篇 university of sc...
  • 6 篇 key laboratory o...
  • 6 篇 science and tech...
  • 6 篇 institute of aut...

作者

  • 23 篇 wenjian luo
  • 18 篇 luo wenjian
  • 16 篇 xufa wang
  • 9 篇 naijie gu
  • 8 篇 wang xufa
  • 8 篇 xianbin cao
  • 8 篇 hu shengshan
  • 8 篇 shao chenxi
  • 8 篇 zhang leo yu
  • 8 篇 gu naijie
  • 8 篇 li minghui
  • 7 篇 baohua zhao
  • 6 篇 chenxi shao
  • 6 篇 ping zhu
  • 6 篇 tao zhu
  • 6 篇 jin hai
  • 5 篇 zhang lei
  • 5 篇 tao dacheng
  • 5 篇 wan wei
  • 5 篇 wanli dong

语言

  • 241 篇 英文
  • 12 篇 中文
  • 5 篇 其他
检索条件"机构=Key Laboratory of Software in Computing and Communication"
257 条 记 录,以下是41-50 订阅
排序:
BADROBOT: JAILBREAKING EMBODIED LLMS IN THE PHYSICAL WORLD
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Hangtao Zhu, Chenyu Wang, Xianlong Zhou, Ziqi Yin, Changgan Li, Minghui Xue, Lulu Wang, Yichen Hu, Shengshan Liu, Aishan Guo, Peijin Zhang, Leo Yu National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Beihang University China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Embodied AI represents systems where AI is integrated into physical entities. Large Language Model (LLM), which exhibits powerful language understanding abilities, has been extensively employed in embodied AI by facil... 详细信息
来源: 评论
DeepSolo++: Let Transformer Decoder with Explicit Points Solo for Multilingual Text Spotting
arXiv
收藏 引用
arXiv 2023年
作者: Ye, Maoyuan Zhang, Jing Zhao, Shanshan Liu, Juhua Liu, Tongliang Du, Bo Tao, Dacheng School of Computer Science National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan China School of Computer Science Faculty of Engineering The University of Sydney Australia JD Explore Academy *** China College of Computing & Data Science Nanyang Technological University Singapore
End-to-end text spotting aims to integrate scene text detection and recognition into a unified framework. Dealing with the relationship between the two sub-tasks plays a pivotal role in designing effective spotters. A... 详细信息
来源: 评论
Robust and Unsupervised KPI Anomaly Detection Based on Highly Sensitive Conditional Variational Auto-Encoders
Robust and Unsupervised KPI Anomaly Detection Based on Highl...
收藏 引用
IEEE International Conference on Big Data and Cloud computing (BdCloud)
作者: Shili Yan Bing Tang Qing Yang Yijia He Xiaoyuan Zhang Hunan Key Laboratory for Service Computing and Novel Software Technology School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China School of Information and Communication Engineering Guangzhou Maritime University Guangzhou China Beijing Jiaotong University Beijing China
To ensure the stability and reliability of service quality, large Internet companies need to closely monitor various KPIs (key Performance Indicators, such as network throughput, CPU usages) and trigger timely trouble... 详细信息
来源: 评论
Hi-SAM: Marrying Segment Anything Model for Hierarchical Text Segmentation
arXiv
收藏 引用
arXiv 2024年
作者: Ye, Maoyuan Zhang, Jing Liu, Juhua Liu, Chenyu Yin, Baocai Liu, Cong Du, Bo Tao, Dacheng School of Computer Science National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan China IFLYTEK Research IFLYTEK CO. LTD. China College of Computing & Data Science Nanyang Technological University #32 Block N4 #02a-014 50 Nanyang Avenue 639798 Singapore
The Segment Anything Model (SAM), a profound vision foundation model pretrained on a large-scale dataset, breaks the boundaries of general segmentation and sparks various downstream applications. This paper introduces... 详细信息
来源: 评论
Noncontact Doppler Radar-based Heart Rate Detection on the SVD and ANC
Noncontact Doppler Radar-based Heart Rate Detection on the S...
收藏 引用
2022 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2022
作者: Shi, Qiuxia Hu, Bin Tian, Fuze Zhao, Qinglin Gansu Provincial Key Laboratory of Wearable Computing School of Information Science and Engineering Lanzhou University China School of Computer and Communication Lanzhou University of Technology China Key Laboratory of Special Functional Materials and Structural Design Lanzhou University Ministry of Education Lanzhou China CAS Center for Excellence in Brain Science and Intelligence Technology Shanghai Institutes for Biological Sciences Chinese Academy of Sciences China Joint Research Center for Cognitive Neurosensor Technology of Lanzhou University Institute of Semiconductors Chinese Academy of Sciences China Engineering Research Center of Open Source Software and Real-Time System Lanzhou University Ministry of Education China
In the Doppler biological radar-based applications of noncontact measurement of vital signs, effectively extracting heartbeat information from weak thoracic mechanical motion is an important problem to be solved. This... 详细信息
来源: 评论
Hidden Follower Detection via Refined Gaze and Walking State Estimation
Hidden Follower Detection via Refined Gaze and Walking State...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Yaxi Chen Ruimin Hu Danni Xu Zheng Wang Linbo Luo Dengshi Li National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan China Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan China School of Computing the National University of Singapore Singapore School of Cyber Engineering Xidian University Xi’an China School of Artificial Intelligence Jianghan University Wuhan China
Hidden following is following behavior with special intentions, and detecting hidden following behavior can prevent many criminal activities in advance. The previous method uses gaze and spacing behaviors to distingui...
来源: 评论
DarkSAM: fooling segment anything model to segment nothing  24
DarkSAM: fooling segment anything model to segment nothing
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Ziqi Zhou Yufei Song Minghui Li Shengshan Hu Xianlong Wang Leo Yu Zhang Dezhong Yao Hai Jin National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology School of Cyber Science and Engineering Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security and School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar...
来源: 评论
Socially Beneficial Metaverse: Framework, Technologies, Applications, and Challenges
arXiv
收藏 引用
arXiv 2023年
作者: Xu, Xiaolong Zhou, Xuanhong Bilal, Muhammad Zeadally, Sherali Crowcroft, Jon Qi, Lianyong Xue, Shengjun Nanjing University of Information Science and Technology Nanjing China School of Software Nanjing University of Information Science and Technology Nanjing China School of Computing and Communications Lancaster University Lancaster United Kingdom College of Communication and Information University of Kentucky Lexington United States Department of Computer Science and Technology University of Cambridge Cambridge United Kingdom State Key Laboratory for Novel Software Technology Nanjing University China School of Computer Science and Technology Silicon Lake College Suzhou China
In recent years, the maturation of emerging technologies such as Virtual Reality, Digital Twin,s and Blockchain has accelerated the realization of the metaverse. As a virtual world independent of the real world, the m... 详细信息
来源: 评论
Reversible Data Hiding With Secret Encrypted Image Sharing and Adaptive Coding
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Fang, Guangtian Wang, Feng Zhao, Chenbin Qin, Chuan Chang, Ching-Chun Chang, Chin-Chen Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Fujian University of Technology College of Computer Science and Mathematics Key Laboratory of Big Data Mining and Applications Fuzhou350118 China Monash University Faculty of IT Department of Software Systems and Cybersecurity VIC3800 Australia Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Feng Chia University Information and Communication Security Research Center Taichuang 40724 Taiwan Feng Chia University Department of Information Engineering and Computer Science Taichung40724 Taiwan
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ... 详细信息
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Li, Minghui Liu, Wei Hu, Shengshan Zhang, Yechao Wan, Wei Xue, Lulu Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab. China Cluster and Grid Computing Lab. China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论