咨询与建议

限定检索结果

文献类型

  • 2,237 篇 期刊文献
  • 1,642 篇 会议
  • 1 册 图书

馆藏范围

  • 3,880 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,596 篇 工学
    • 1,403 篇 计算机科学与技术...
    • 1,107 篇 软件工程
    • 519 篇 信息与通信工程
    • 393 篇 电气工程
    • 327 篇 控制科学与工程
    • 314 篇 电子科学与技术(可...
    • 273 篇 生物工程
    • 270 篇 化学工程与技术
    • 214 篇 生物医学工程(可授...
    • 194 篇 光学工程
    • 182 篇 机械工程
    • 180 篇 材料科学与工程(可...
    • 152 篇 仪器科学与技术
    • 128 篇 动力工程及工程热...
    • 96 篇 交通运输工程
    • 94 篇 土木工程
    • 85 篇 网络空间安全
    • 81 篇 建筑学
  • 1,659 篇 理学
    • 776 篇 数学
    • 561 篇 物理学
    • 329 篇 生物学
    • 254 篇 化学
    • 219 篇 统计学(可授理学、...
    • 137 篇 系统科学
    • 85 篇 地球物理学
  • 505 篇 管理学
    • 286 篇 管理科学与工程(可...
    • 238 篇 图书情报与档案管...
    • 108 篇 工商管理
  • 167 篇 医学
    • 133 篇 临床医学
    • 113 篇 基础医学(可授医学...
  • 77 篇 农学
  • 54 篇 法学
  • 37 篇 经济学
  • 15 篇 教育学
  • 9 篇 军事学
  • 7 篇 艺术学
  • 2 篇 文学
  • 1 篇 历史学

主题

  • 96 篇 semantics
  • 78 篇 feature extracti...
  • 60 篇 training
  • 57 篇 deep learning
  • 53 篇 accuracy
  • 50 篇 computational mo...
  • 43 篇 neural networks
  • 42 篇 optimization
  • 40 篇 machine learning
  • 38 篇 object detection
  • 36 篇 image segmentati...
  • 35 篇 data mining
  • 32 篇 predictive model...
  • 30 篇 simulation
  • 29 篇 correlation
  • 29 篇 privacy
  • 28 篇 federated learni...
  • 28 篇 data models
  • 27 篇 cosmic rays
  • 27 篇 contrastive lear...

机构

  • 195 篇 key laboratory o...
  • 156 篇 school of comput...
  • 137 篇 key laboratory o...
  • 99 篇 university of sc...
  • 99 篇 university of ch...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 yunnan observato...
  • 94 篇 tianfu cosmic ra...
  • 87 篇 key laboratory o...
  • 87 篇 school of physic...
  • 86 篇 department of ph...
  • 86 篇 key laboratory f...
  • 85 篇 center for astro...
  • 85 篇 college of physi...
  • 84 篇 institute of fro...
  • 84 篇 school of physic...
  • 83 篇 school of physic...
  • 81 篇 national space s...
  • 79 篇 moscow institute...

作者

  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 bastieri d.
  • 77 篇 jiang k.
  • 73 篇 danzengluobu
  • 72 篇 kuleshov d.
  • 72 篇 liu d.
  • 71 篇 chen m.j.
  • 71 篇 liu s.m.
  • 71 篇 huang d.h.
  • 71 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li xin
  • 68 篇 li cheng
  • 68 篇 bao y.w.
  • 68 篇 liu b.
  • 67 篇 hu h.b.
  • 65 篇 min z.
  • 64 篇 zheng wei-shi

语言

  • 3,496 篇 英文
  • 310 篇 其他
  • 84 篇 中文
检索条件"机构=Ministry of Education Key Laboratory in Scientific and Engineering Computing"
3880 条 记 录,以下是611-620 订阅
排序:
Reinforcement Learning Based Interference Coordination for Port Communications
Reinforcement Learning Based Interference Coordination for P...
收藏 引用
IEEE Conference on Vehicular Technology (VTC)
作者: Siyao Li Chuhuan Liu Yifan Chen Liang Xiao Helin Yang Dept. of Information and Communication Engineering Xiamen University Xiamen China Key Laboratory of Multimedia Trusted Perception and Efficient Computing Ministry of Education of China Xiamen University China
Reliable port communications support maritime applications such as vessel navigation and cargo tracking for a large number of mobile users on ships, but the quality of services (QoS) such as data rate and energy consu... 详细信息
来源: 评论
Grasp as You Say: Language-guided Dexterous Grasp Generation
arXiv
收藏 引用
arXiv 2024年
作者: Wei, Yi-Lin Jiang, Jian-Jian Xing, Chengyi Tan, Xian-Tuo Wu, Xiao-Ming Li, Hao Cutkosky, Mark Zheng, Wei-Shi School of Computer Science and Engineering Sun Yat-sen University China Stanford University United States Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China
This paper explores a novel task "Dexterous Grasp as You Say" (DexGYS), enabling robots to perform dexterous grasping based on human commands expressed in natural language. However, the development of this f... 详细信息
来源: 评论
PNRITR:Research on Positive and Negative Entity Region Perception Methods for Image-Text Retrieval  36
PNRITR:Research on Positive and Negative Entity Region Perce...
收藏 引用
36th International Conference on Software engineering and Knowledge engineering, SEKE 2024
作者: Zhang, Zhiping Sun, Tao Zheng, Hongyan Liu, Hao Liu, Gengchen Yang, Zhi Wang, Xiaoyu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The aim of cross-modal image-text retrieval is to heighten comprehension and to create robust associations between visual and textual content. This process entails a mutual querying and synchronization across various ... 详细信息
来源: 评论
Transfer Learning of Real Image Features with Soft Contrastive Loss for Fake Image Detection
arXiv
收藏 引用
arXiv 2024年
作者: Liang, Ziyou Liu, Weifeng Wang, Run Wu, Mengjie Li, Boheng Zhang, Yuyang Wang, Lina Yang, Xinyi Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University China Nanyang Technological University Singapore NSFOCUS China
In the last few years, the artifact patterns in fake images synthesized by different generative models have been inconsistent, leading to the failure of previous research that relied on spotting subtle differences bet... 详细信息
来源: 评论
SMGC-SBERT: A Multi-Feature Fusion Chinese Short Text Similarity Computation Model Based on Optimised SBERT
SMGC-SBERT: A Multi-Feature Fusion Chinese Short Text Simila...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Zhao, Shuo Gu, Qiliang Zhang, Jianqiang Song, Gongpeng Lu, Qin Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Shandong Branch of China Mobile Communication Group Design Institute Co. Jinan China
Chinese short text similarity computation stands as a pivotal task within natural language processing, garnering significant attention. However, existing models grapple with limitations in handling intricate semantic ... 详细信息
来源: 评论
Reinforcement Learning Based QoS-Aware Anti-Jamming Underwater Video Transmission
Reinforcement Learning Based QoS-Aware Anti-Jamming Underwat...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Shiyu Sun Shun Chen Shaoxuan Li Zefang Lv Liang Xiao Wei Su Dept. of Information and Communication Engineering Xiamen University Xiamen China Key Laboratory of Multimedia Trusted Perception and Efficient Computing Ministry of Education of China Xiamen University China
Underwater video transmission has to ensure quality-of-service (QoS) against jamming with severe multipath effect and narrow bandwidth limitation that degrade the communication performance under variable channel state... 详细信息
来源: 评论
A Hybrid Blockchain Scheme for Tracing Manufacturing Processes and Trading Transactions  22
A Hybrid Blockchain Scheme for Tracing Manufacturing Process...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: Yuan, Ye Yang, Mingxing Xiong, Ruoting Sun, Yani Zhang, Xianchao Ren, Wei HuBei Land Resources Vocational College China China University of Geosciences Gemological Institute Wuhan China University of East Anglia School of Computing Science United Kingdom Yunnan Innovation Institute Beihang University Yunnan Key Laboratory of Blockchain Application Technology Kunming China Jiaxing University Key Laboratory of Medical Electronics and Digital Health of Zhejiang Province Jiaxing China State Key Laboratory of Geo-Information Engineering Key Laboratory of Surveying and Mapping Science and Geospatial Information Technology Mnr Beijing China Ministry of Education China China University of Geosciences School of Computer Science Wuhan China
Blockchain can be envisioned as an enabling framework in terms of cryptography and distributed computing to construct trusted data records among un-trusted users. It can be applied in two typical scenarios - historica... 详细信息
来源: 评论
FreqSense: Universal and Low-Latency Adversarial Example Detection for Speaker Recognition with Interpretability in Frequency Domain
FreqSense: Universal and Low-Latency Adversarial Example Det...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yihuan Huang Yuanzhe Li Yanzhen Ren Weiping Tu Yuhong Yang Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University
Speaker recognition (SR) systems are particularly vulnerable to adversarial example (AE) attacks. To mitigate these attacks, AE detection systems are typically integrated into SR systems. To overcome the limitations o... 详细信息
来源: 评论
A Description Model of Multi-Step Attack Planning Domain Based on Knowledge Representation
收藏 引用
Chinese Journal of Electronics 2023年 第3期22卷 437-441页
作者: HU Liang XIE Nannan CHAI Sheng Nurbol Key Laboratory of Symbolic Computing and Knowledge Engineering of Ministry of Education Computer Science and Technology College Jilin University Changchun China Information Science and Engineering College Xinjiang University Urumqi China
Alerts of intrusion detection system are numerous, complex, and difficult to analyze. Alert correlation of multi-step attack is one of the solutions to this problem. Intelligence planning is an important research area... 详细信息
来源: 评论
FCC-MF: Detecting Violence in Audio-Visual Context with Frame-Wise Cluster Contrast and Modality-Stage Flooding
FCC-MF: Detecting Violence in Audio-Visual Context with Fram...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Jiaqing He Yanzhen Ren Liming Zhai Wuyang Liu School of Cyber Science and Engineering Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Computer Science Central China Normal University
This paper explores the detection of frame-wise instances of violence in both audio and visual modalities, where only clip-level labels are available. Previous works selected fixed value of frames for objective optimi...
来源: 评论