咨询与建议

限定检索结果

文献类型

  • 2,016 篇 期刊文献
  • 1,496 篇 会议
  • 1 册 图书

馆藏范围

  • 3,513 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,407 篇 工学
    • 1,559 篇 计算机科学与技术...
    • 1,251 篇 软件工程
    • 599 篇 信息与通信工程
    • 383 篇 电气工程
    • 286 篇 电子科学与技术(可...
    • 276 篇 控制科学与工程
    • 250 篇 生物工程
    • 185 篇 化学工程与技术
    • 181 篇 光学工程
    • 159 篇 生物医学工程(可授...
    • 148 篇 机械工程
    • 140 篇 仪器科学与技术
    • 101 篇 材料科学与工程(可...
    • 86 篇 动力工程及工程热...
    • 74 篇 交通运输工程
    • 73 篇 建筑学
  • 1,351 篇 理学
    • 631 篇 数学
    • 437 篇 物理学
    • 299 篇 生物学
    • 209 篇 统计学(可授理学、...
    • 186 篇 化学
    • 86 篇 系统科学
    • 74 篇 地球物理学
  • 670 篇 管理学
    • 384 篇 管理科学与工程(可...
    • 322 篇 图书情报与档案管...
    • 129 篇 工商管理
  • 169 篇 医学
    • 143 篇 临床医学
    • 106 篇 基础医学(可授医学...
    • 70 篇 药学(可授医学、理...
  • 96 篇 法学
    • 81 篇 社会学
  • 59 篇 经济学
  • 45 篇 农学
  • 28 篇 教育学
  • 9 篇 文学
  • 9 篇 军事学
  • 3 篇 艺术学

主题

  • 98 篇 semantics
  • 74 篇 deep learning
  • 74 篇 feature extracti...
  • 61 篇 training
  • 58 篇 data mining
  • 47 篇 computational mo...
  • 43 篇 convolution
  • 37 篇 data models
  • 33 篇 machine learning
  • 32 篇 object detection
  • 31 篇 visualization
  • 31 篇 accuracy
  • 30 篇 task analysis
  • 30 篇 optimization
  • 28 篇 knowledge engine...
  • 28 篇 big data
  • 28 篇 federated learni...
  • 27 篇 semantic segment...
  • 26 篇 knowledge graph
  • 26 篇 contrastive lear...

机构

  • 156 篇 school of inform...
  • 102 篇 school of comput...
  • 99 篇 university of ch...
  • 55 篇 university of sc...
  • 52 篇 school of econom...
  • 51 篇 school of inform...
  • 51 篇 fujian provincia...
  • 48 篇 key laboratory o...
  • 47 篇 school of physic...
  • 44 篇 hebei normal uni...
  • 44 篇 state key labora...
  • 44 篇 yunnan observato...
  • 43 篇 school of cyber ...
  • 42 篇 tianfu cosmic ra...
  • 42 篇 center for astro...
  • 42 篇 key laboratory o...
  • 42 篇 school of inform...
  • 41 篇 department of ph...
  • 40 篇 college of physi...
  • 39 篇 key laboratory o...

作者

  • 46 篇 feng c.f.
  • 46 篇 guo y.q.
  • 45 篇 bao y.w.
  • 44 篇 niyato dusit
  • 44 篇 hu h.b.
  • 44 篇 liu b.
  • 44 篇 danzengluobu
  • 43 篇 li xin
  • 42 篇 li cheng
  • 41 篇 liu c.
  • 40 篇 axikegu
  • 39 篇 fang j.
  • 39 篇 huang y.
  • 38 篇 bastieri d.
  • 38 篇 jiang k.
  • 38 篇 kuleshov d.
  • 38 篇 min z.
  • 38 篇 liu d.
  • 38 篇 chen m.j.
  • 38 篇 luo q.

语言

  • 2,809 篇 英文
  • 632 篇 其他
  • 81 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Information Technology Jiangxi Key Laboratory of Data and Knowledge Engineering"
3513 条 记 录,以下是271-280 订阅
排序:
What's the Real: A Novel Design Philosophy for Robust AI-Synthesized Voice Detection  24
What's the Real: A Novel Design Philosophy for Robust AI-Syn...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Hai, Xuan Liu, Xin Tan, Yuan Liu, Gang Li, Song Niu, Weina Zhou, Rui Zhou, Xiaokang School of Information Science and Engineering Lanzhou University Lanzhou China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Faculty of Business Data Science Kansai University Osaka Japan
Voice is one of the most widely used media for information transmission in human society. While high-quality synthetic voices are extensively utilized in various applications, they pose significant risks to content se... 详细信息
来源: 评论
Suppress Content Shift: Better Diffusion Features via Off-the-Shelf Generation Techniques  38
Suppress Content Shift: Better Diffusion Features via Off-th...
收藏 引用
38th Conference on Neural information Processing Systems, NeurIPS 2024
作者: Meng, Benyuan Xu, Qianqian Wang, Zitai Yang, Zhiyong Cao, Xiaochun Huang, Qingming Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China Peng Cheng Laboratory China School of Computer Science and Tech. University of Chinese Academy of Sciences China School of Cyber Science and Tech. Shenzhen Campus of Sun Yat-sen University China Key Laboratory of Big Data Mining and Knowledge Management CAS China
Diffusion models are powerful generative models, and this capability can also be applied to discrimination. The inner activations of a pre-trained diffusion model can serve as features for discriminative tasks, namely...
来源: 评论
Zero Watermarking Algorithm for Medical Image Based on Resnet50-DCT
收藏 引用
Computers, Materials & Continua 2023年 第4期75卷 293-309页
作者: Mingshuai Sheng Jingbing Li Uzair Aslam Bhatti Jing Liu Mengxing Huang Yen-Wei Chen School of Information and Communication Engineering Hainan UniversityHaikou570228China State Key Laboratory of Marine Resource Utilization in the South China Sea Hainan UniversityHaikou570228China School of Computer Science and Technology Hainan UniversityHaikou570228China Research Center for Healthcare Data Science Zhejiang LabHangzhou311121China Graduate School of Information Science and Engineering Ritsumeikan UniversityKyoto5258577Japan
Medical images are used as a diagnostic tool, so protecting theirconfidentiality has long been a topic of study. From this, we propose aResnet50-DCT-based zero watermarking algorithm for use with medicalimages. To beg... 详细信息
来源: 评论
P2 Law: Scaling Law for Post-Training After Model Pruning
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Xiaodong Hu, Yuxuan Zhang, Xiaokang Wang, Yanling Li, Cuiping Chen, Hong Zhang, Jing School of Information Renmin University of China Beijing China Key Laboratory of Data Engineering and Knowledge Engineering Beijing China Zhongguancun Laboratory China
Pruning has become a widely adopted technique for reducing the hardware requirements of large language models (LLMs). To recover model performance after pruning, post-training is commonly employed to mitigate the resu... 详细信息
来源: 评论
Not All Diffusion Model Activations Have Been Evaluated as Discriminative Features  38
Not All Diffusion Model Activations Have Been Evaluated as D...
收藏 引用
38th Conference on Neural information Processing Systems, NeurIPS 2024
作者: Meng, Benyuan Xu, Qianqian Wang, Zitai Cao, Xiaochun Huang, Qingming Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China Peng Cheng Laboratory China School of Cyber Science and Tech. Shenzhen Campus of Sun Yat-sen University China School of Computer Science and Tech. University of Chinese Academy of Sciences China Key Laboratory of Big Data Mining and Knowledge Management CAS China
Diffusion models are initially designed for image generation. Recent research shows that the internal signals within their backbones, named activations, can also serve as dense features for various discriminative task...
来源: 评论
An Actor-centric Causality Graph for Asynchronous Temporal Inference in Group Activity
An Actor-centric Causality Graph for Asynchronous Temporal I...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Zhao Xie Tian Gao Kewei Wu Jiao Chang Key Laboratory of Knowledge Engineering with Big Data Hefei University of Technology School of Computer Science and Information Engineering Hefei University of Technology
The causality relation modeling remains a challenging task for group activity recognition. The causality relations describe the influence on the centric actor (effect actor) from its correlative actors (cause actors)....
来源: 评论
Residential Energy Consumption Forecasting Based on Federated Reinforcement Learning with data Privacy Protection
收藏 引用
Computer Modeling in engineering & Sciences 2023年 第10期137卷 717-732页
作者: You Lu Linqian Cui YunzheWang Jiacheng Sun Lanhui Liu School of Electronic and Information Engineering Suzhou University of Science and TechnologySuzhou215009China Jiangsu Province Key Laboratory of Intelligent Building Energy Efficiency Suzhou University of Science and TechnologySuzhou215009China Chongqing Industrial Big Data Innovation Center Co. Ltd.Chongqing400707China
Most studies have conducted experiments on predicting energy consumption by integrating data formodel ***, the process of centralizing data can cause problems of data ***,many laws and regulationson data security and ... 详细信息
来源: 评论
Quantifying the agreement and accuracy characteristics of four satellite-based LULC products for cropland classification in China
收藏 引用
Journal of Integrative Agriculture 2024年 第1期23卷 283-297页
作者: Jie Xue Xianglin Zhang Songchao Chen Bifeng Hu Nan Wang Zhou Shi Department of Land Management Zhejiang UniversityHangzhou 310058China Institute of Applied Remote Sensing and Information Technology College of Environmental and Resource SciencesZhejiang UniversityHangzhou 310058China ZJU-Hangzhou Global Scientific and Technological Innovation Center Zhejiang UniversityHangzhou 311215China Department of Land Resource Management School of Public Finance and Public AdministrationJiangxi University of Finance and EconomicsNanchang 330013China Key Laboratory of Data Science in Finance and Economics Jiangxi University of Finance and EconomicsNanchang 330013China Key Laboratory of Spectroscopy Sensing Ministry of Agriculture and Rural AffairsHangzhou 310058China
Various land use and land cover(LULC)products have been produced over the past decade with the development of remote sensing *** the differences in LULC classification schemes,there is a lack of research on assessing ... 详细信息
来源: 评论
A secure quantum homomorphic encryption ciphertext retrieval scheme
收藏 引用
Soft Computing 2025年 第3期29卷 1497-1509页
作者: Cheng, Zhen-Wen Chen, Xiu-Bo Xu, Gang Chang, Yan Miao, Li-Hua Yang, Yi-Xian Wang, Ya-Lan School of Data and Computer Science Shandong Women’s University Jinan250300 China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China School of Information Science and Technology North China University of Technology Beijing100144 China School of Cybersecurity Chengdu University of Information Technology Chengdu610225 China Huawei Technologies Co. Ltd Shenzhen518129 China Department of Computer Science Faculty of Engineering and Physical Sciences University of Surrey Surrey GuildfordGU2 7XH United Kingdom
In a recent paper (Gong et al. Quantum Inf Process 19:3, 2020), a novel ciphertext retrieval scheme based on the Grover algorithm and quantum homomorphic encryption was presented. In this scheme, when the server perfo... 详细信息
来源: 评论
Research on Metaverse Security and Forensics
收藏 引用
Computers, Materials & Continua 2023年 第10期77卷 799-825页
作者: Guangjun Liang Jianfang Xin Qun Wang Xueli Ni Xiangmin Guo Pu Chen Department of Computer Information and Cyber Security Jiangsu Police InstituteNanjingChina Engineering Research Center of Electronic Data Forensics Analysis NanjingChina Key Laboratory of Digital Forensics Department of Public Security of Jiangsu ProvinceNanjingChina School of Intelligent Engineering Nanjing Institute of Railway TechnologyNanjingChina
As a subversive concept,the metaverse has recently attracted widespread attention around the world and has set off a wave of enthusiasm in academic,industrial,and investment ***,while the metaverse brings unprecedente... 详细信息
来源: 评论