咨询与建议

限定检索结果

文献类型

  • 276 篇 期刊文献
  • 199 篇 会议

馆藏范围

  • 475 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 300 篇 工学
    • 211 篇 计算机科学与技术...
    • 184 篇 软件工程
    • 49 篇 控制科学与工程
    • 47 篇 信息与通信工程
    • 40 篇 生物工程
    • 39 篇 光学工程
    • 30 篇 电气工程
    • 25 篇 生物医学工程(可授...
    • 22 篇 机械工程
    • 20 篇 交通运输工程
    • 17 篇 电子科学与技术(可...
    • 16 篇 材料科学与工程(可...
    • 13 篇 化学工程与技术
    • 10 篇 仪器科学与技术
    • 10 篇 安全科学与工程
    • 7 篇 动力工程及工程热...
    • 6 篇 土木工程
  • 160 篇 理学
    • 80 篇 数学
    • 52 篇 物理学
    • 45 篇 生物学
    • 28 篇 统计学(可授理学、...
    • 14 篇 化学
    • 13 篇 系统科学
  • 94 篇 管理学
    • 60 篇 管理科学与工程(可...
    • 39 篇 图书情报与档案管...
    • 17 篇 工商管理
  • 30 篇 医学
    • 26 篇 临床医学
    • 17 篇 基础医学(可授医学...
    • 10 篇 药学(可授医学、理...
  • 11 篇 法学
    • 9 篇 社会学
  • 5 篇 经济学
  • 5 篇 农学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 17 篇 deep learning
  • 14 篇 reinforcement le...
  • 12 篇 semantics
  • 12 篇 feature extracti...
  • 10 篇 machine learning
  • 10 篇 training
  • 9 篇 predictive model...
  • 8 篇 image segmentati...
  • 8 篇 artificial intel...
  • 8 篇 intelligent syst...
  • 7 篇 computer science
  • 7 篇 scalability
  • 7 篇 semantic segment...
  • 7 篇 task analysis
  • 7 篇 three-dimensiona...
  • 7 篇 convolution
  • 7 篇 laboratories
  • 7 篇 trajectory
  • 7 篇 correlation
  • 6 篇 automation

机构

  • 52 篇 school of artifi...
  • 28 篇 beijing engineer...
  • 28 篇 guangdong engine...
  • 25 篇 university of ch...
  • 19 篇 state key labora...
  • 18 篇 qingdao academy ...
  • 14 篇 center for resea...
  • 14 篇 the state key la...
  • 14 篇 state key labora...
  • 13 篇 ieee
  • 10 篇 cloud computing ...
  • 10 篇 state key labora...
  • 10 篇 state key labora...
  • 9 篇 intelligent manu...
  • 9 篇 the beijing engi...
  • 9 篇 the state key la...
  • 8 篇 beijing national...
  • 8 篇 department of co...
  • 7 篇 school of comput...
  • 7 篇 state key labora...

作者

  • 57 篇 gang xiong
  • 34 篇 xiong gang
  • 29 篇 zhen shen
  • 20 篇 xisong dong
  • 19 篇 fei-yue wang
  • 18 篇 shen zhen
  • 17 篇 dong xisong
  • 13 篇 xiuqin shang
  • 13 篇 fenghua zhu
  • 13 篇 fan rui
  • 13 篇 wang lihui
  • 12 篇 hu xiaolin
  • 11 篇 sun maosong
  • 10 篇 bin hu
  • 9 篇 liu yang
  • 9 篇 wang liang
  • 9 篇 shichao chen
  • 8 篇 zhu fenghua
  • 8 篇 liu qiang
  • 8 篇 wu shu

语言

  • 448 篇 英文
  • 18 篇 其他
  • 9 篇 中文
检索条件"机构=Research Center for Intelligent Computing Systems State Key Laboratory of Computer Architecture"
475 条 记 录,以下是171-180 订阅
排序:
Heterogeneous Embodied Multi-Agent Collaboration
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Xinzhu Guo, Di Liu, Huaping The Department of Computer Science and Technology Tsinghua University Beijing100084 China The State Key Laboratory of Intelligent Technology and Systems Beijing National Research Center for Information Science and Technology Tsinghua University Beijing100084 China The School of Artificial Intelligence Beijing University of Posts and Telecommunications Beijing China
Multi-agent embodied tasks have recently been studied in complex indoor visual environments. Collaboration among multiple agents can improve work efficiency and has significant practical value. However, most of the ex... 详细信息
来源: 评论
MGDefect: A Mask-Guided High-Quality Defect Image Generation Method for Improving Defect Inspection
收藏 引用
IEEE Transactions on Multimedia 2025年
作者: Jiang, Xiaoheng Li, Yingjie Yan, Feng Lu, Yang Xu, Changsheng Xu, Mingliang Zhengzhou University School of Computer and Artificial Intelligence Zhengzhou450001 China National Supercomputing Center in Zhengzhou Engineering Research Center of Intelligent Swarm Systems Ministry of Education Zhengzhou450001 China Chinese Academy of Sciences State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation Beijing100190 China University of Chinese Academy of Sciences School of Artificial Intelligence Beijing100049 China
Deep learning based defect inspection methods have achieved promising performance, which usually relies on a large number of well-labeled training samples. However, it requires much effort to obtain enough annotated s... 详细信息
来源: 评论
Decentralized and Lightweight Cross-Chain Transaction Scheme Based on Proxy Re-signature
Decentralized and Lightweight Cross-Chain Transaction Scheme...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Huiying Zou Jia Duan Xi Liu Wei Ren Tao Li Xianghan Zheng Kim-Kwang Raymond Choo School of Computer Science China University of Geosciences Wuhan China The Third Surveying and Mapping Institute of Hunan Province Hunan Engineering Research Center of Geographic Information Security and Application Hunan China Key Laboratory of Data Protection and Intelligent Management Sichuan University Ministry of Education China State Key Laboratory of Geo-Information Engineering and Key Laboratory of Surveying and Mapping Science and Geospatial Information Technology of MNR CASM Beijing China College of Computer and Big Data Fuzhou University School of Information and Intelligent Engineering Sanya College China Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio USA
With the widespread application of digital assets and the rapid development of blockchain technology, achieving secure and efficient transactions between different blockchain networks has become an urgent challenge. E... 详细信息
来源: 评论
Adaptive Backdoor Attacks with Reasonable Constraints on Graph Neural Networks
arXiv
收藏 引用
arXiv 2025年
作者: Dong, Xuewen Li, Jiachen Li, Shujun You, Zhichao Qu, Qiang Kholodov, Yaroslav Shen, Yulong School of Computer Science and Technology Xidian University The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education China The Shaanxi Key Laboratory of Blockchain and Secure Computing Xi’an710071 China University of Kent CanterburyCT2 7NP United Kingdom Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences China Intelligent Transportation Systems Lab Innopolis University Innopolis Russia School of Computer Science and Technology Xidian University China The Shaanxi Key Laboratory of Network and System Security Xi’an710071 China
Recent studies show that graph neural networks (GNNs) are vulnerable to backdoor attacks. Existing backdoor attacks against GNNs use fixed-pattern triggers and lack reasonable trigger constraints, overlooking individu... 详细信息
来源: 评论
A Novel Deep Learning Approach Featuring Graph-Based Algorithm for Cell Segmentation and Tracking
A Novel Deep Learning Approach Featuring Graph-Based Algorit...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Keliang Zhao Jovial Niyogisubizo Linxia Xiao Yi Pan Dongqing Wei Didi Rosiyadi Yanjie Wei Shenzhen Key Laboratory of Intelligent Bioinformatics and Center for High Performance Computing Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen China College of Computer Science and Control Engineering Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences Shenzhen China State Key Laboratory of Microbial Metabolism and School of Life Sciences and Biotechnology Shanghai Jiao Tong University Shanghai China Research Center for Artificial Intelligence and Cybersecurity National Research and Innovation Agency Bandung Indonesia
The precise segmentation and tracking of cells in microscopy image sequences play a pivotal role in biomedical research, facilitating the study of tissue, organ, and organism development. However, manual segmentation ...
来源: 评论
A Distance Similarity-based Genetic Optimization Algorithm for Satellite Ground Network Planning Considering Feeding Mode
arXiv
收藏 引用
arXiv 2024年
作者: Ren, Yingying Li, Qiuli Guo, Yangyang Pedrycz, Witold Xing, Lining Liu, Anfeng Song, Yanjie School of Computer Electronics and Information Guangxi University Nanning China Guangxi Key Laboratory of Multimedia Communications and Network Technology China Key Laboratory of Parallel Distributed and Intelligent Computing Guangxi University China School of Systems Science Beijing Jiaotong University Beijing China Department of Electrical and Computer Engineering University of Alberta Edmonton Canada Systems Research Institute Polish Academy of Sciences Poland Faculty of Engineering and Natural Sciences Department of Computer Engineering Sariyer Istanbul Turkey School of Electronic Engineering Xidian University Xian China School of Electronic Engineering Central South University Changsha China National Engineering Research Center of Maritime Navigation System Dalian Maritime University Dalian China
With the rapid development of the satellite industry, the information transmission network based on communication satellites has gradually become a major and important part of the future satellite ground integration n... 详细信息
来源: 评论
TEVA: Training-Efficient and Verifiable Aggregation for Federated Learning for Consumer Electronics in Industry 5.0
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Xia, Yuanjun Liu, Yining Chen, Jingxue Liang, Yangfan Khan, Fazlullah Alturki, Ryan Wang, Xiaopei Guilin University of Electronic Technology Guangxi Key Laboratory of Trusted Software School of Computer and Information Security Guilin541004 China Wenzhou University of Technology School of Data Science and Artificial Intelligence Wenzhou325027 China University of Technology School of Mathematical and Physical Sciences SydneyNSW2007 Australia Jiaxing University Provincial Key Laboratory of Multimodal Perceiving and Intelligent Systems The Key Laboratory of Medical Electronics and Digital Health of Zhejiang Province The Engineering Research Center of Intelligent Human Health Situation Awareness of Zhejiang Province Jiaxing314001 China University of Nottingham Ningbo China School of Computer Science Faculty of Science and Engineering Zhejiang Ningbo315104 China Umm AI-Qura University Makkah Department of Software Engineering College of Computing Saudi Arabia Riverside Department of Computer Science and Engineering University of California CA92521 United States
Federated learning (FL) has been widely used for privacy-preserving model updates in Industry 5.0, facilitated by 6G networks. Despite FL's privacy-preserving advantages, it remains vulnerable to attacks where adv... 详细信息
来源: 评论
Robust Imagined Speech Production from Electrocorticography with Adaptive Frequency Enhancement
Robust Imagined Speech Production from Electrocorticography ...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Xu Xu Chong Fu Junxin Chen Gwanggil Jeon David Camacho School of Computer Science and Engineering Northeastern University Shenyang China School of Software Dalian University of Technology Dalian China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang China Engineering Research Center of Security Technology of Complex Network System Ministry of Education Shenyang China College of Information Technology Incheon National University Incheon Korea Department of Computer Systems Engineering Universidad Politécnica de Madrid Madrid Spain
Imagined speech production with electrocorticography (ECoG) plays a crucial role in brain-computer interface system. A challenging issue is the great variation underlying the frequency bands of the ECoG signals’ enco... 详细信息
来源: 评论
YOLO-Ant: A Lightweight Detector via Depthwise Separable Convolutional and Large Kernel Design for Antenna Interference Source Detection
arXiv
收藏 引用
arXiv 2024年
作者: Tang, Xiaoyu Chen, Xingming Cheng, Jintao Wu, Jin Fan, Rui Zhang, Chengxi Zhou, Zebo The School of Electronic and Information Engineering Faculty of Engineering South China Normal University Guangdong Foshan528225 China The School of Physics South China Normal University Guangdong Guangzhou510000 China The Department of Electronic and Computer Engineering Hong Kong University of Science and Technology Hong Kong The College of Electronics & Information Engineering Shanghai Research Institute for Intelligent Autonomous Systems The State Key Laboratory of Intelligent Autonomous Systems Frontiers Science Center for Intelligent Autonomous Systems Tongji University Shanghai201804 China The School of Internet of Things Engineering Jiangnan University Wuxi214122 China The School of Aeronautics Astronautics University of Electronic Science and Technology of China and Aircraft swarm intelligent sensing and cooperative control Key Laboratory of Sichuan Province Chengdu610097 China The National Laboratory on Adaptive Optics Chengdu610209 China
In the era of 5G communication, removing interference sources that affect communication is a resource-intensive task. The rapid development of computer vision has enabled unmanned aerial vehicles to perform various hi... 详细信息
来源: 评论
OverlapMamba: Novel Shift state Space Model for LiDAR-based Place Recognition
arXiv
收藏 引用
arXiv 2024年
作者: Xiang, Qiuchi Cheng, Jintao Luo, Jiehao Wu, Jin Fan, Rui Chen, Xieyuanli Tang, Xiaoyu School of Data Science and Engineering Xingzhi College South China Normal University Shanwei516600 China School of Electronic and Information Engineering South China Normal University Guangdong Foshan528225 China Department of Electronic and Computer Engineering Hong Kong University of Science and Technology Hong Kong College of Intelligence Science and Technology National University of Defense Technology Changsha China College of Electronics & Information Engineering Shanghai Research Institute for Intelligent Autonomous Systems The State Key Laboratory of Intelligent Autonomous Systems Frontiers Science Center for Intelligent Autonomous Systems Tongji University Shanghai201804 China
Place recognition is the foundation for enabling autonomous systems to achieve independent decision-making and safe operations. It is also crucial in tasks such as loop closure detection and global localization within... 详细信息
来源: 评论