咨询与建议

限定检索结果

文献类型

  • 603 篇 期刊文献
  • 315 篇 会议

馆藏范围

  • 918 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 551 篇 工学
    • 258 篇 计算机科学与技术...
    • 203 篇 软件工程
    • 121 篇 信息与通信工程
    • 115 篇 电气工程
    • 111 篇 电子科学与技术(可...
    • 69 篇 仪器科学与技术
    • 57 篇 光学工程
    • 52 篇 航空宇航科学与技...
    • 48 篇 控制科学与工程
    • 43 篇 动力工程及工程热...
    • 41 篇 生物工程
    • 35 篇 化学工程与技术
    • 28 篇 环境科学与工程(可...
    • 25 篇 机械工程
    • 19 篇 材料科学与工程(可...
    • 17 篇 力学(可授工学、理...
    • 17 篇 建筑学
    • 16 篇 土木工程
  • 468 篇 理学
    • 188 篇 物理学
    • 168 篇 地球物理学
    • 124 篇 数学
    • 59 篇 生物学
    • 56 篇 统计学(可授理学、...
    • 47 篇 大气科学
    • 34 篇 化学
    • 27 篇 天文学
  • 103 篇 管理学
    • 65 篇 管理科学与工程(可...
    • 44 篇 图书情报与档案管...
    • 23 篇 工商管理
  • 20 篇 农学
  • 15 篇 法学
    • 14 篇 社会学
  • 15 篇 医学
  • 12 篇 经济学
  • 3 篇 教育学
  • 3 篇 文学
  • 3 篇 军事学

主题

  • 14 篇 stars
  • 14 篇 optimization
  • 14 篇 feature extracti...
  • 13 篇 gamma rays
  • 11 篇 polarization
  • 11 篇 galaxies
  • 11 篇 polarimeters
  • 11 篇 training
  • 10 篇 deep learning
  • 10 篇 speech processin...
  • 10 篇 computational mo...
  • 10 篇 machine learning
  • 9 篇 pulsars
  • 9 篇 three-dimensiona...
  • 9 篇 throughput
  • 9 篇 signal processin...
  • 9 篇 semantics
  • 9 篇 remote sensing
  • 9 篇 accuracy
  • 8 篇 supernovae

机构

  • 43 篇 university of ch...
  • 41 篇 school of comput...
  • 37 篇 national astrono...
  • 37 篇 national enginee...
  • 35 篇 department of ph...
  • 33 篇 school of cyber ...
  • 32 篇 shanghai astrono...
  • 32 篇 national astrono...
  • 32 篇 perimeter instit...
  • 31 篇 kavli institute ...
  • 30 篇 california insti...
  • 30 篇 waterloo centre ...
  • 29 篇 instituto de ast...
  • 29 篇 key laboratory o...
  • 29 篇 enrico fermi ins...
  • 28 篇 university of sc...
  • 27 篇 data science ins...
  • 27 篇 cornell center f...
  • 26 篇 hubei key labora...
  • 26 篇 national enginee...

作者

  • 33 篇 gurwell mark
  • 32 篇 bremer michael
  • 32 篇 broderick avery ...
  • 31 篇 fromm christian ...
  • 31 篇 friberg per
  • 30 篇 james david j.
  • 30 篇 christian pierre
  • 30 篇 bronzwaer thomas
  • 30 篇 fish vincent l.
  • 30 篇 blackburn lindy
  • 29 篇 chael andrew
  • 29 篇 brissenden roger
  • 28 篇 chan chi-kwan
  • 28 篇 huang chih-wei l...
  • 28 篇 bower geoffrey c...
  • 27 篇 conway john e.
  • 27 篇 eatough ralph p.
  • 27 篇 davelaar jordy
  • 27 篇 johnson michael ...
  • 27 篇 issaoun sara

语言

  • 819 篇 英文
  • 77 篇 其他
  • 18 篇 中文
检索条件"机构=National Key Laboratory of Data Space Technology and System"
918 条 记 录,以下是91-100 订阅
排序:
FIRE: combining multi-stage filtering with taint analysis for scalable recurring vulnerability detection  24
FIRE: combining multi-stage filtering with taint analysis fo...
收藏 引用
Proceedings of the 33rd USENIX Conference on Security Symposium
作者: Siyue Feng Yueming Wu Wenjie Xue Sikui Pan Deqing Zou Yang Liu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China and Jinyinhu Laboratory China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology China
With the continuous development of software open-sourcing, the reuse of open-source software has led to a significant increase in the occurrence of recurring vulnerabilities. These vulnerabilities often arise through ...
来源: 评论
SC-GNN: A Communication-Efficient Semantic Compression for Distributed Training of GNNs  24
SC-GNN: A Communication-Efficient Semantic Compression for D...
收藏 引用
61st ACM/IEEE Design Automation Conference, DAC 2024
作者: Wang, Jihe Wu, Ying Wang, Danghui School of Computer Science Northwestern Polytechnical University Xi'an China Engineering Research Center of Embedded System Integration Ministry of Education Northwestern Polytechnical University Xi'an China National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology Northwestern Polytechnical University Xi'an China
Training big graph neural networks (GNNs) in distributed systems is quite time-consuming mainly because of the ubiquitous aggregate operations that involve a large amount of cross-partition communication for collectin... 详细信息
来源: 评论
Improved Power Conversion Efficiency and Stability of Perovskite Solar Cells Induced by Dual Interface Passivation
Improved Power Conversion Efficiency and Stability of Perovs...
收藏 引用
2023 International Conference on Optoelectronic Materials and Devices, ICOMD 2023
作者: Guan, Nianci Han, Qizhuo Institute of Biomedical Materials & Engineering Northwestern Polytechnical University Xi'an710072 China The School of Computer Science National Engineering Laboratory for Integrated Aero-Space-Ground- Ocean Big Data Application Technology Shaanxi Provincial Key Laboratory of Speech and Image Information Processing Northwestern Polytechnical University Xi’an710072 China
Efficient and stable Perovskite solar cells (PSCs) have been successfully produced using a dual-layer modified (DLM) perovskite thin film. This method simultaneously modifies both the bottom (SnO2/perovskite) and top ... 详细信息
来源: 评论
Backdoor Attacks on Bimodal Salient Object Detection with RGB-Thermal data  24
Backdoor Attacks on Bimodal Salient Object Detection with RG...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Yin, Wen Zhu, Bin Benjamin Xie, Yulai Zhou, Pan Feng, Dan School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Microsoft Corporation Beijing China Wuhan National Laboratory for Optoelectronics Huazhong University of Science and Technology Wuhan China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China
RGB-Thermal Salient Object Detection (RGBT-SOD) plays a critical role in complex scene recognition applications, such as autonomous driving. However, security research in this domain is still in its infancy. This pape... 详细信息
来源: 评论
Effective and Imperceptible Adversarial Textual Attack Via Multi-objectivization
收藏 引用
ACM Transactions on Evolutionary Learning and Optimization 2024年 第3期4卷 1-23页
作者: Liu, Shengcai Lu, Ning Hong, Wenjing Qian, Chao Tang, Ke Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen College of Engineering South Tower 1088 Xueyuan Avenue Guangdong Shenzhen518055 China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong999077 Hong Kong National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen 10F Zhizhen Building Canghai Campus 3688 Nanhai Avenue Guangdong Shenzhen China National Key Laboratory for Novel Software Technology School of Artificial Intelligence Nanjing University Nanjing International College Area Xianlin Campus 163 Xianlin Avenue Jiangsu Nanjing China
The field of adversarial textual attack has significantly grown over the past few years, where the commonly considered objective is to craft adversarial examples (AEs) that can successfully fool the target model. Howe... 详细信息
来源: 评论
Less Yet Robust: Crucial Region Selection for Scene Recognition
Less Yet Robust: Crucial Region Selection for Scene Recognit...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Zhang, Jianqi Wang, Mengxuan Wang, Jingyao Si, Lingyu Zheng, Changwen Xu, Fanjiang National Key Laboratory of Space Integrated Information System Institute of Software Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China Shien-Ming Wu School of Intelligent Engineering South China University of Technology Guangzhou China
Scene recognition, particularly for aerial and underwater images, often suffers from various types of degradation, such as blurring or overexposure. Previous works that focus on convolutional neural networks have been... 详细信息
来源: 评论
MeDiC: Metasearch Service on Distributed Confidential data
MeDiC: Metasearch Service on Distributed Confidential Data
收藏 引用
IEEE International Conference on Web Services (ICWS)
作者: Wenchun Jing Jingru Yang Yun Ma Yi Liu Chaoran Luo National Key Laboratory of Data Space Technology and System Beijing China School of Computer Science Peking University Beijing China Advanced Institute of Big Data Beijing China Institute for Artificial Intelligence Peking University Beijing China
Traditional search engines aggregate vast amount of data on the Internet to provide keyword search services. However, in some privacy-sensitive fields like healthcare and e-government, the personal data often contains... 详细信息
来源: 评论
Mining World Indicators for Analyzing and Modeling the Development of Countries
收藏 引用
ACM/IMS Transactions on data Science 2021年 第4期2卷 1–27页
作者: Huang, Hong Chi, Mingyuan Song, Yu Jin, Hai The National Engineering Research Center for Big Data Technology and System Key Laboratory of Service Computing Technology and System Ministry of Education School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
The world indicators released by the World Bank or other organizations usually give the basic public knowledge about the world. However, separate and static index lacks the complex interplay among different indicators... 详细信息
来源: 评论
Joint ADS-B in 5G for Hierarchical Aerial Networks: Performance Analysis and Optimization  35
Joint ADS-B in 5G for Hierarchical Aerial Networks: Performa...
收藏 引用
35th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2024
作者: Jia, Ziye Liao, Yiyang Dong, Chao He, Lijun Wu, Qihui Zhang, Lei Nanjing University of Aeronautics and Astronautics The Key Laboratory of Dynamic Cognitive System of Electromagnetic Spectrum Space Ministry of Industry and Information Technology Jiangsu Nanjing210016 China Southeast University National Mobile Communications Research Laboratory Jiangsu Nanjing211111 China Northwestern Polytechnical University School of Software Shanxi Xi'an710129 China
Unmanned aerial vehicles (UAVs) are widely applied in multiple fields, which emphasizes the challenge of obtaining UAV flight information to ensure the airspace safety. UAVs equipped with automatic dependent surveilla... 详细信息
来源: 评论
Unlearnable 3D point clouds: class-wise transformation is all you need  24
Unlearnable 3D point clouds: class-wise transformation is al...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing systems
作者: Xianlong Wang Minghui Li Wei Liu Hangtao Zhang Shengshan Hu Yechao Zhang Ziqi Zhou Hai Jin National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security and School of Cyber Science and Engineering Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security and School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论