咨询与建议

限定检索结果

文献类型

  • 148 篇 会议
  • 78 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 227 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 170 篇 工学
    • 138 篇 计算机科学与技术...
    • 114 篇 软件工程
    • 50 篇 信息与通信工程
    • 18 篇 控制科学与工程
    • 14 篇 机械工程
    • 12 篇 电气工程
    • 12 篇 电子科学与技术(可...
    • 9 篇 生物工程
    • 7 篇 生物医学工程(可授...
    • 7 篇 网络空间安全
    • 6 篇 交通运输工程
    • 5 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 动力工程及工程热...
    • 5 篇 安全科学与工程
    • 3 篇 材料科学与工程(可...
  • 78 篇 理学
    • 57 篇 数学
    • 16 篇 物理学
    • 13 篇 统计学(可授理学、...
    • 9 篇 生物学
    • 5 篇 系统科学
  • 52 篇 管理学
    • 32 篇 图书情报与档案管...
    • 22 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 11 篇 法学
    • 10 篇 社会学
  • 9 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 3 篇 公共卫生与预防医...
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 3 篇 农学
    • 3 篇 作物学
  • 2 篇 教育学
  • 1 篇 艺术学

主题

  • 9 篇 privacy
  • 9 篇 cryptography
  • 6 篇 authentication
  • 6 篇 semantics
  • 6 篇 training
  • 5 篇 wireless sensor ...
  • 5 篇 feature extracti...
  • 4 篇 deep learning
  • 4 篇 computational mo...
  • 4 篇 security
  • 4 篇 protocols
  • 4 篇 accuracy
  • 4 篇 adaptation model...
  • 3 篇 access control
  • 3 篇 support vector m...
  • 3 篇 big data
  • 3 篇 image segmentati...
  • 3 篇 ad hoc networks
  • 3 篇 optimization
  • 3 篇 real-time system...

机构

  • 8 篇 school of comput...
  • 8 篇 school of cyber ...
  • 8 篇 beijing key lab....
  • 8 篇 guangxi collabor...
  • 7 篇 college of infor...
  • 6 篇 school of comput...
  • 5 篇 shanghai key lab...
  • 5 篇 nanjing fenghuo ...
  • 4 篇 school of comput...
  • 4 篇 ministry of edu....
  • 4 篇 school of cyber ...
  • 4 篇 college of compu...
  • 4 篇 key lab. of comp...
  • 4 篇 school of comput...
  • 4 篇 key lab of compu...
  • 4 篇 purple mountain ...
  • 4 篇 key laboratory o...
  • 4 篇 key lab. of comp...
  • 4 篇 guangxi key lab ...
  • 4 篇 jiangsu high tec...

作者

  • 11 篇 wang yun
  • 9 篇 li hui
  • 8 篇 chunhe xia
  • 8 篇 tianbo wang
  • 8 篇 he jieyue
  • 7 篇 yun wang
  • 7 篇 shih timothy k.
  • 6 篇 chen chen
  • 6 篇 zhang min-ling
  • 5 篇 mi jiacong
  • 5 篇 feng yu
  • 5 篇 liu yongshan
  • 5 篇 zhang yu
  • 4 篇 fan kai
  • 4 篇 yong-zhen li
  • 4 篇 jinbin tu
  • 4 篇 xin geng
  • 4 篇 tu jinbin
  • 4 篇 ma wenping
  • 4 篇 wang yue

语言

  • 203 篇 英文
  • 13 篇 中文
  • 11 篇 其他
检索条件"机构=Lab. of Computer Network and Information Integration"
227 条 记 录,以下是61-70 订阅
排序:
Image-Text Retrieval with Intra-Modal Soft lab.ls
SSRN
收藏 引用
SSRN 2022年
作者: Zhang, Yu Liu, Haoliang Xiong, Wei Mi, Siya Bian, Yali School of Computer Science and Engineering The Key Lab of Computer Network and Information Integration Ministry of Education Southeast University Nanjing211189 China School of Cyber Science and Engineering Southeast University Nanjing211189 China Purple Mountain Laboratories Nanjing China Intel Labs United States
Image-text retrieval attempts to find relevant images from a huge corpus of images given a textual description, and vice versa. Existing works usually denote the negative/positive image-text pair with a binary lab.l. ... 详细信息
来源: 评论
Mining Latent Classes for Few-shot Segmentation
Mining Latent Classes for Few-shot Segmentation
收藏 引用
International Conference on computer Vision (ICCV)
作者: Lihe Yang Wei Zhuo Lei Qi Yinghuan Shi Yang Gao State Key Laboratory for Novel Software Technology Nanjing University Tencent Key Lab of Computer Network and Information Integration (Ministry of Education) Southeast University
Few-shot segmentation (FSS) aims to segment unseen classes given only a few annotated samples. Existing methods suffer the problem of feature undermining, i.e., potential novel classes are treated as background during... 详细信息
来源: 评论
Disentangled High Quality Salient Object Detection
Disentangled High Quality Salient Object Detection
收藏 引用
International Conference on computer Vision (ICCV)
作者: Lv Tang Bo Li Yijie Zhong Shouhong Ding Mofei Song Youtu Lab Tencent Shanghai China The School of Computer Science and Engineering Southeast University Nanjing China The Key Lab of Computer Network and Information Integration (Ministry of Education) Southeast University Nanjing China
Aiming at discovering and locating most distinctive objects from visual scenes, salient object detection (SOD) plays an essential role in various computer vision systems. Coming to the era of high resolution, SOD meth... 详细信息
来源: 评论
A Lightening Fine-grained Access Control Scheme Supporting Full Policy Hiding in Cloud Storage
A Lightening Fine-grained Access Control Scheme Supporting F...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Jiaoli Shi Chao Hu Shimao Yao Zhuolin Mei Bin Wu Hui Li School of Computer and Big Data Jiujiang Univ. Jiujiang China School of Software IoT Engineering Jiangxi Univ. of Finance and Economics Nanchang China Jiujiang Key Lab. of Network and Information Security Jiujiang China School of Computer and Big Data Jiujiang University Jiujiang China School of Elec. and Comp. Engineering Peking University Shenzhen China
Efficiency, security, and flexibility are difficult to balance in a full policy hiding CP-ABE scheme. This paper creatively converts the privacy matching problem of access policy and a user’s private key to the priva...
来源: 评论
MutexMatch: Semi-Supervised Learning with Mutex-Based Consistency Regularization
arXiv
收藏 引用
arXiv 2022年
作者: Duan, Yue Zhao, Zhen Qi, Lei Wang, Lei Zhou, Luping Shi, Yinghuan Gao, Yang The National Key Laboratory for Novel Software Technology The National Institute of Healthcare Data Science Nanjing University Nanjing210023 China The School of Electrical and Information Engineering The University of Sydney SydneyNSW2006 Australia The School of Computer Science and Engineering The Key Lab of Computer Network and Information Integration Ministry of Education Southeast University Nanjing211189 China The School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia
The core issue in semi-supervised learning (SSL) lies in how to effectively leverage unlab.led data, whereas most existing methods tend to put a great emphasis on the utilization of high-confidence samples yet seldom ... 详细信息
来源: 评论
DRL-Based Optimization for AoI and Energy Consumption in C-V2X Enabled IoV
IEEE Transactions on Green Communications and Networking
收藏 引用
IEEE Transactions on Green Communications and networking 2025年
作者: Zhang, Zheng Wu, Qiong Fan, Pingyi Cheng, Nan Chen, Wen Letaief, Khaled B. Jiangnan University School of Internet of Things Engineering Wuxi214122 China Tsinghua University Beijing National Research Center for Information Science and Technology Department of Electronic Engineering State Key laboratory of Space Network and Communications Tsinghua University Beijing100084 China Xidian University State Key Lab. of ISN School of Telecom-munications Engineering Xi'an710071 China Shanghai Jiao Tong University Department of Electronic Engineering Shanghai200240 China Department of Electrical and Computer Engineer-ing Hong Kong
To address communication latency issues, the Third Generation Partnership Project (3GPP) has defined Cellular-Vehicle to Everything (C-V2X) technology, which includes Vehicle-to-Vehicle (V2V) communication for direct ... 详细信息
来源: 评论
Veca: A High-Performance Consensus Algorithm for State Machine Replication  4th
Veca: A High-Performance Consensus Algorithm for State Machi...
收藏 引用
4th International Conference on Human Centered Computing, HCC 2018
作者: Yan, Xiangguang Wang, Yun Southeast University Nanjing China Key Lab of Computer Network and Information Integration MOE Nanjing China
Consensus algorithm is fundamental for distributed systems. It requires high throughput, low latency and high availab.lity. However, to the best of our knowledge, these requirements cannot be satisfied well at the sam... 详细信息
来源: 评论
Hybrid Attentional Memory network for Computational drug repositioning
arXiv
收藏 引用
arXiv 2020年
作者: He, Jieyue Yang, Xinxing Gong, Zhuo Zamit, Lbrahim School of Computer Science and Engineering Key Lab of Computer Network & Information Integration MOE Southeast University Nanjing210018 China
Background: Drug repositioning is designed to discover new uses of known drugs, which is an important and efficient method of drug discovery. Researchers only use one certain type of Collab.rative Filtering (CF) model... 详细信息
来源: 评论
Better Pseudo-lab.l: Joint Domain-aware lab.l and Dual-classifier for Semi-supervised Domain Generalization
arXiv
收藏 引用
arXiv 2021年
作者: Wang, Ruiqi Qi, Lei Shi, Yinghuan Gao, Yang State Key Laboratory for Novel Software Technology Nanjing University Nanjing China National Institute of Healthcare Data Science Nanjing University Nanjing China School of Computer Science and Engineering Key Lab of Computer Network and Information Integration Ministry of Education Southeast University Nanjing China
With the goal of directly generalizing trained model to unseen target domains, domain generalization (DG), a newly proposed learning paradigm, has attracted considerable attention. Previous DG models usually require a... 详细信息
来源: 评论
Robust Generalization against Photon-Limited Corruptions via Worst-Case Sharpness Minimization
arXiv
收藏 引用
arXiv 2023年
作者: Huang, Zhuo Zhu, Miaoxi Xia, Xiaobo Shen, Li Yu, Jun Gong, Chen Han, Bo Du, Bo Liu, Tongliang Syndey Ai Centre The University of Sydney Australia National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence School of Computer Science Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University China Jd Explore Academy China Department of Automation University of Science and Technology of China China Key Lab. of Intelligent Percept. and Syst. for High-Dimensional Information of Ministry of Education School of Computer Science and Engineering Nanjing University of Science and Technology China Department of Computer Science Hong Kong Baptist University Hong Kong
Robust generalization aims to tackle the most challenging data distributions which are rare in the training set and contain severe noises, i.e., photon-limited corruptions. Common solutions such as distributionally ro... 详细信息
来源: 评论