咨询与建议

限定检索结果

文献类型

  • 243 篇 期刊文献
  • 214 篇 会议

馆藏范围

  • 457 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 281 篇 工学
    • 214 篇 计算机科学与技术...
    • 190 篇 软件工程
    • 53 篇 信息与通信工程
    • 51 篇 电气工程
    • 41 篇 生物工程
    • 34 篇 光学工程
    • 25 篇 生物医学工程(可授...
    • 22 篇 控制科学与工程
    • 17 篇 机械工程
    • 16 篇 化学工程与技术
    • 12 篇 建筑学
    • 11 篇 电子科学与技术(可...
    • 9 篇 仪器科学与技术
    • 9 篇 动力工程及工程热...
    • 9 篇 交通运输工程
    • 7 篇 土木工程
  • 130 篇 理学
    • 75 篇 数学
    • 40 篇 生物学
    • 30 篇 物理学
    • 24 篇 统计学(可授理学、...
    • 16 篇 化学
  • 59 篇 管理学
    • 33 篇 图书情报与档案管...
    • 30 篇 管理科学与工程(可...
    • 9 篇 工商管理
  • 17 篇 医学
    • 16 篇 临床医学
    • 13 篇 基础医学(可授医学...
    • 7 篇 公共卫生与预防医...
    • 7 篇 药学(可授医学、理...
  • 11 篇 法学
    • 8 篇 社会学
  • 5 篇 教育学
    • 5 篇 教育学
  • 4 篇 经济学
  • 3 篇 农学
  • 2 篇 艺术学
  • 1 篇 文学

主题

  • 31 篇 semantics
  • 22 篇 training
  • 21 篇 deep learning
  • 20 篇 feature extracti...
  • 13 篇 contrastive lear...
  • 13 篇 graph neural net...
  • 12 篇 signal processin...
  • 11 篇 conferences
  • 11 篇 speech processin...
  • 11 篇 data mining
  • 11 篇 accuracy
  • 10 篇 machine learning
  • 9 篇 computational mo...
  • 8 篇 magnetic resonan...
  • 8 篇 three-dimensiona...
  • 8 篇 image segmentati...
  • 8 篇 neural networks
  • 8 篇 convolution
  • 7 篇 knowledge engine...
  • 7 篇 object detection

机构

  • 69 篇 key laboratory o...
  • 50 篇 south china univ...
  • 45 篇 school of softwa...
  • 23 篇 pazhou laborator...
  • 22 篇 college of compu...
  • 20 篇 engineering rese...
  • 20 篇 pazhou lab
  • 20 篇 school of comput...
  • 18 篇 fujian key labor...
  • 18 篇 key laboratory o...
  • 17 篇 college of infor...
  • 15 篇 engineering rese...
  • 13 篇 hubei engineerin...
  • 13 篇 key laboratory o...
  • 12 篇 key laboratory o...
  • 10 篇 national univers...
  • 9 篇 key laboratory o...
  • 9 篇 school of comput...
  • 9 篇 information tech...
  • 9 篇 engineering rese...

作者

  • 36 篇 tan mingkui
  • 16 篇 wang guoyin
  • 16 篇 wu qingyao
  • 13 篇 mingkui tan
  • 12 篇 cai yi
  • 12 篇 wang lihui
  • 11 篇 qingyao wu
  • 10 篇 niu shuaicheng
  • 10 篇 zhang yifan
  • 9 篇 xia shuyin
  • 9 篇 jian-tao zhou
  • 9 篇 miao qiguang
  • 9 篇 zhao zhang
  • 8 篇 liu jun
  • 8 篇 gan chuang
  • 8 篇 li thomas h.
  • 7 篇 zhu jinhui
  • 7 篇 meng wang
  • 7 篇 chen yaofo
  • 7 篇 zhao peilin

语言

  • 420 篇 英文
  • 29 篇 其他
  • 16 篇 中文
检索条件"机构=Ministry of Education Key Laboratory of Big Data and Intelligent Robot"
457 条 记 录,以下是1-10 订阅
排序:
Rethinking-based Code Summarization with Chain of Comments  31
Rethinking-based Code Summarization with Chain of Comments
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Cao, Liuwen He, Hongkui Huang, Hailin Wang, Jiexin Cai, Yi School of Software Engineering South China University of Technology China Key Laboratory of Big Data and Intelligent Robot South China University of Technology Ministry of Education China
Automatic code summarization aims to generate concise natural language descriptions (summary) for source code, which can free software developers from the heavy burden of manual commenting and software maintenance. Ex... 详细信息
来源: 评论
Enhancing Adversarial Example Transferability via Regularized Constrained Feature Layer
收藏 引用
Computers, Materials & Continua 2025年 第4期83卷 157-175页
作者: Xiaoyin Yi Long Chen Jiacheng Huang Ning Yu Qian Huang School of Computer Science and Technology Chongqing University of Posts and TelecommunicationsChongqing400065China Chongqing Key Laboratory of Public Big Data Security Technology Chongqing401420China School of Cyber Security and Information Law Chongqing University of Posts and TelecommunicationsChongqing400065China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of EducationChongqing400065China Artificial Intelligence and Big Data College Chongqing Polytechnic University of Electronic TechnologyChongqing401331China
Transfer-based Adversarial Attacks(TAAs)can deceive a victim model even without prior *** is achieved by leveraging the property of adversarial *** is,when generated from a surrogate model,they retain their features i... 详细信息
来源: 评论
Improved quantum image weighted average filtering algorithm
收藏 引用
Quantum Information Processing 2025年 第5期24卷 1-24页
作者: Yuan, Suzhen Li, Xianli Yinxia, Shu Qing, Xianrong Deng, Jermiah D. College of Opto Electronic Engineering Chongqing University of Posts and Telecommunications Chongqing Chongqing400065 China School of Computing University of Otago Dunedin Dunedin9054 New Zealand School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing Chongqing400065 China Chongqing Key Laboratory of Computational Intelligence Key Laboratory of Big Data Intelligent Computing Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing University of Posts and Telecommunications Chongqing Chongqing400065 China
Average filtering plays a vital role in image smoothing tasks. However, existing quantum image weighted average filtering methods suffer from high circuit complexity. Therefore, this paper proposes an improved quantum... 详细信息
来源: 评论
A numerical magnitude aware multi-channel hierarchical encoding network for math word problem solving
收藏 引用
Neural Computing and Applications 2025年 第3期37卷 1651-1672页
作者: Xu, Junjie Chen, Yuzhong Xiao, Lingsheng Liao, Hongmiao Zhong, Jiayuan Dong, Chen College of Computer and Data Science Fuzhou University Fujian Province Fuzhou350108 China Engineering Research Center of Big Data Intelligence Ministry of Education Fuzhou China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fujian Province Fuzhou350108 China
Math word problem (MWP) represents a critical research area within reading comprehension, where accurate comprehension of math problem text is crucial for generating math expressions. However, current approaches still... 详细信息
来源: 评论
Gupacker: Generalized Unpacking Framework for Android Malware
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 4338-4352页
作者: Zheng, Tao Hou, Qiyu Chen, Xingshu Ren, Hao Li, Meng Li, Hongwei Shen, Changxiang Sichuan University School of Cyber Science and Engineering Chengdu610065 China Sichuan University School of Cyber Science and Engineering Cyber Science Research Institute Key Laboratory of Data Protection and Intelligent Management Ministry of Education Chengdu610065 China Hefei University of Technology Key Laboratory of Knowledge Engineering with Big Data Ministry of Education Intelligent Interconnected Systems Laboratory of Anhui Province School of Computer Science and Information Engineering Hefei230002 China University of Padua Department of Mathematics HIT Center Padua35131 Italy University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Sichuan University Cyber Science Research Institute Key Laboratory of Data Protection and Intelligent Management Ministry of Education Chengdu610065 China
Android malware authors often use packers to evade analysis. Although many unpacking tools have been proposed, they face two significant challenges: 1) They are easily impeded by anti-analysis techniques employed by p... 详细信息
来源: 评论
An Evolutionary Multitasking Algorithm for Efficient Multiobjective Recommendations
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第3期6卷 518-532页
作者: Tian, Ye Ji, Luke Hu, Yiwei Ma, Haiping Wu, Le Zhang, Xingyi Anhui University Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and Technology Hefei230601 China Anhui University Institutes of Physical Science and Information Technology Hefei230601 China Hefei University of Technology Key Laboratory of Knowledge Engineering with Big Data Hefei230029 China
Represented by evolutionary algorithms and swarm intelligence algorithms, nature-inspired metaheuristics have been successfully applied to recommender systems and amply demonstrated effectiveness, in particular, for m... 详细信息
来源: 评论
GBSVM: An Efficient and Robust Support Vector Machine Framework via Granular-Ball Computing
收藏 引用
IEEE Transactions on Neural Networks and Learning Systems 2025年 第5期36卷 9253-9267页
作者: Xia, Shuyin Lian, Xiaoyu Wang, Guoyin Gao, Xinbo Chen, Jiancu Peng, Xiaoli Chongqing University of Posts and Telecommunications Chongqing Key Laboratory of Computational Intelligence Key Laboratory of Big Data Intelligent Computing Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing400065 China
Granular-ball support vector machine (GBSVM) is a significant attempt to construct a classifier using the coarse-to-fine granularity of a granular ball as input, rather than a single data point. It is the first classi... 详细信息
来源: 评论
Enhancing graph representation learning via type-aware decoupling and node influence allocation
收藏 引用
Applied Intelligence 2025年 第6期55卷 1-14页
作者: Zhu, Guochang Hu, Jun Liu, Li Zhang, Qinghua Wang, Guoyin School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongwen Road Chongqing Chongqing400065 China Chongqing Key Laboratory of Computational Intelligence Chongqing University of Posts and Telecommunications Chongwen Road Chongqing Chongqing400065 China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing400065 China
The traditional graph representation methods can fit the information of graph with low-dimensional vectors, but they cannot interpret their composition, resulting in insufficient security. Graph decoupling, as a metho... 详细信息
来源: 评论
Stacking U-Nets in U-shape: Redesigning the Information Flow in Model-based Networks for MRI Reconstruction
Stacking U-Nets in U-shape: Redesigning the Information Flow...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Qiao, Xiaoyu Li, Weisheng Xiao, Bin Huang, Yuping Yang, Lijian Chongqing Key Laboratory of Image Cognition Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and Telecommunications Ministry of Education Chongqing China
Model-based networks have shown convincing performance in MRI reconstruction. However, the unrolled cascades within the networks are constrained to solely obtain information from the preceding counterpart, resulting i... 详细信息
来源: 评论
Subsampling Decomposition based k-Space Refinement for Accelerated MRI Reconstruction
Subsampling Decomposition based k-Space Refinement for Accel...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Qiao, Xiaoyu Li, Weisheng Xiao, Bin Huang, Yuping Yang, Lijian Chongqing Key Laboratory of Image Cognition Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and Telecommunications Ministry of Education Chongqing China
In accelerated MRI reconstruction problem, directly recovering all the missing k-space data from undersampled measurements is highly ill-posed and often leads to suboptimal performance. To address the problem, we prop... 详细信息
来源: 评论