咨询与建议

限定检索结果

文献类型

  • 2,370 篇 会议
  • 1,960 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 4,346 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,847 篇 工学
    • 1,942 篇 计算机科学与技术...
    • 1,522 篇 软件工程
    • 588 篇 信息与通信工程
    • 353 篇 电气工程
    • 351 篇 控制科学与工程
    • 312 篇 电子科学与技术(可...
    • 256 篇 生物工程
    • 219 篇 机械工程
    • 208 篇 光学工程
    • 166 篇 生物医学工程(可授...
    • 151 篇 仪器科学与技术
    • 142 篇 动力工程及工程热...
    • 139 篇 化学工程与技术
    • 99 篇 交通运输工程
    • 90 篇 网络空间安全
    • 88 篇 材料科学与工程(可...
    • 81 篇 土木工程
    • 81 篇 安全科学与工程
    • 77 篇 建筑学
  • 1,446 篇 理学
    • 714 篇 数学
    • 384 篇 物理学
    • 313 篇 生物学
    • 214 篇 统计学(可授理学、...
    • 152 篇 化学
    • 146 篇 系统科学
  • 758 篇 管理学
    • 506 篇 管理科学与工程(可...
    • 282 篇 图书情报与档案管...
    • 200 篇 工商管理
  • 183 篇 医学
    • 151 篇 临床医学
    • 118 篇 基础医学(可授医学...
  • 116 篇 法学
  • 73 篇 经济学
  • 57 篇 农学
  • 25 篇 教育学
  • 20 篇 军事学
  • 10 篇 艺术学
  • 9 篇 文学

主题

  • 99 篇 feature extracti...
  • 90 篇 semantics
  • 77 篇 computational mo...
  • 72 篇 computer science
  • 69 篇 deep learning
  • 67 篇 training
  • 62 篇 computer archite...
  • 59 篇 cloud computing
  • 56 篇 laboratories
  • 54 篇 optimization
  • 54 篇 servers
  • 52 篇 grid computing
  • 51 篇 scalability
  • 50 篇 protocols
  • 48 篇 bandwidth
  • 48 篇 predictive model...
  • 48 篇 accuracy
  • 44 篇 data models
  • 43 篇 analytical model...
  • 43 篇 machine learning

机构

  • 128 篇 school of comput...
  • 101 篇 national enginee...
  • 93 篇 hubei province k...
  • 88 篇 school of comput...
  • 75 篇 department of co...
  • 54 篇 services computi...
  • 49 篇 services computi...
  • 48 篇 school of softwa...
  • 45 篇 hubei province k...
  • 45 篇 services computi...
  • 44 篇 national enginee...
  • 43 篇 state key labora...
  • 42 篇 school of cyber ...
  • 38 篇 huazhong univers...
  • 38 篇 tsinghua nationa...
  • 35 篇 school of inform...
  • 35 篇 school of comput...
  • 35 篇 national enginee...
  • 34 篇 key laboratory o...
  • 33 篇 university of ch...

作者

  • 234 篇 hai jin
  • 189 篇 jin hai
  • 52 篇 xiaofei liao
  • 36 篇 liao xiaofei
  • 34 篇 niyato dusit
  • 33 篇 deqing zou
  • 31 篇 dan feng
  • 30 篇 shi xuanhua
  • 28 篇 zou deqing
  • 27 篇 shen linlin
  • 27 篇 song wu
  • 25 篇 hu shengshan
  • 24 篇 wang wei
  • 22 篇 li peng
  • 21 篇 liu yang
  • 19 篇 liu jun
  • 19 篇 jiang wenbin
  • 18 篇 xiaolong zhang
  • 18 篇 zhang xiaolong
  • 17 篇 li bo

语言

  • 3,944 篇 英文
  • 268 篇 其他
  • 141 篇 中文
  • 1 篇 德文
  • 1 篇 日文
检索条件"机构=Services Computing Technology and System Laboratory School of Computer Science & Technology"
4346 条 记 录,以下是711-720 订阅
排序:
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Xiaogeng Li, Minghui Wang, Haoyu Hu, Shengshan Ye, Dengpan Jin, Hai Wu, Libing Xiao, Chaowei School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab China School of Cyber Science and Engineering Wuhan University China Arizona State University United States
Deep neural networks are proven to be vulnerable to backdoor attacks. Detecting the trigger samples during the inference stage, i.e., the test-time trigger sample detection, can prevent the backdoor from being trigger... 详细信息
来源: 评论
CMD: A Cache-assisted GPU Memory Deduplication Architecture
arXiv
收藏 引用
arXiv 2024年
作者: Zhao, Wei Feng, Dan Tong, Wei Wei, Xueliang Wu, Bing The Wuhan National Laboratory for Optoelectronics Key Laboratory of Information Storage System Engineering Research Center of Data Storage Systems and Technology Ministry of Education of China School of Computer Science and Technology Huazhong University of Science and Technology China
Massive off-chip accesses in GPUs are the main performance bottleneck, and we divided these accesses into three types: (1) Write, (2) Data-Read, and (3) Read-Only. Besides, We find that many writes are duplicate, and ... 详细信息
来源: 评论
A Simultaneous Wireless Information and Power Transfer-based Multi-hop Clustering Routing Protocol for RF Energy Harvesting-Cognitive Radio Sensor Networks
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2023年 第3期8卷 991-1007页
作者: Wang, Ji-Hong Su, Xi-Tong Ge, Yi-Yang Chen, Yeh-Cheng Key Laboratory of Modern Power System Simulation and Control & Renewable Energy Technology Ministry of Education Northeast Electric Power University China School of Electrical Engineering Northeast Electric Power University 169 Changchun Road Jilin132012 China Department of Computer Science University of California DavisCA001313 United States
Radio frequency energy harvesting (RF EH) and clustering are promising solutions to solve the energy constraint problem faced by cognitive radio sensor networks (CRSNs). However, study on clustering routing protocol d... 详细信息
来源: 评论
NeuVSA: A Unified and Efficient Accelerator for Neural Vector Search
NeuVSA: A Unified and Efficient Accelerator for Neural Vecto...
收藏 引用
IEEE Symposium on High-Performance computer Architecture
作者: Ziming Yuan Lei Dai Wen Li Jie Zhang Shengwen Liang Ying Wang Cheng Liu Huawei Li Xiaowei Li Jiafeng Guo Peng Wang Renhai Chen Gong Zhang State Key Lab of Processors Institute of Computing TechnologyCAS University of Chinese Academy of Sciences School of Computer and Information Technology Shanxi University School of Computer Science Peking University Zhongguancun National Laboratory Beijing Key Lab of Network Data Science and Technology Institute of Computing Technology CAS Huawei Technologies Co. Ltd. China
Neural Vector Search (NVS) has exhibited superior search quality over traditional key-based strategies for information retrieval tasks. An effective NVS architecture requires high recall, low latency, and high through... 详细信息
来源: 评论
Size-Invariance Matters: Rethinking Metrics and Losses for Imbalanced Multi-object Salient Object Detection  41
Size-Invariance Matters: Rethinking Metrics and Losses for I...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Li, Feiran Xu, Qianqian Bao, Shilong Yang, Zhiyong Cong, Runmin Cao, Xiaochun Huang, Qingming Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Institute of Information Science Beijing Jiaotong University Beijing China School of Control Science and Engineering Shandong University Jinan China Key Laboratory of Machine Intelligence and System Control Ministry of Education Jinan China School of Cyber Science and Tech. Sun Yat-sen University Shenzhen Campus China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China
This paper explores the size-invariance of evaluation metrics in Salient Object Detection (SOD), especially when multiple targets of diverse sizes co-exist in the same image. We observe that current metrics are size-s... 详细信息
来源: 评论
Over-the-RIS Modulation: A Reconfigurable Intelligent Surface Assisted Modulation Design  8
Over-the-RIS Modulation: A Reconfigurable Intelligent Surfac...
收藏 引用
8th International Conference on Communication, Image and Signal Processing, CCISP 2023
作者: Huang, Yiqian Zammit, Saviour Yang, Ping Xiao, Yue Zhang, Bo Chen, Jienan Xiang, Wei University of Electronic Science and Technology of China National Key Laboratory of Sciencec and Technology on Communications Sichuan China University of Malta Department of Communications and Computer Engineering Msida Malta 32806 Troops Beijing China School of Computing Engineering and Mathematical Sciences La Trobe University Melbourne Australia
This paper proposes an improved over the air modulation (OTAM) scheme by using the powerful reconfigurable intelligent surfaces (RISs), namely over-the-RIS modulation (ORM). In the design framework, we reconstruct mul... 详细信息
来源: 评论
Covert Communication in Satellite-Terrestrial systems with a Full-Duplex Receiver
Covert Communication in Satellite-Terrestrial Systems with a...
收藏 引用
2024 International Conference on Satellite Internet, SAT-NET 2024
作者: Guo, Zewei Sun, Ranran He, Ji Shen, Yulong Jiang, Xiaohong Future University Hakodate School of Systems Information Science Hakodate041-8655 Japan Hangzhou Institute of Technology Xidian University Hangzhou311200 China Xidian University School of Computer Science and Technology Xi'an710071 China Institute of Systems General Academy of Systems Engineering Academy of Military Sciences Beijing100101 China Xidian University Shaanxi Key Laboratory of Network and System Security Xi'an710071 China
This paper investigates the covert communication in a satellite-terrestrial system, including a satellite transmitter Alice, a terrestrial full-duplex receiver Bob and a terrestrial warden Willie. To help the covert t... 详细信息
来源: 评论
ESNet: evolution and succession network for high-resolution salient object detection  24
ESNet: evolution and succession network for high-resolution ...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Hongyu Liu Runmin Cong Hua Li Qianqian Xu Qingming Huang Wei Zhang Institute of Information Science Beijing Jiaotong University & Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing China School of Control Science and Engineering Shandong University & Key Laboratory of Machine Intelligence and System Control Ministry of Education Jinan China School of Computer Science and Technology Hainan University Hainan China Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China
Preserving details and avoiding high computational costs are the two main challenges for the High-Resolution Salient Object Detection (HRSOD) task. In this paper, we propose a two-stage HRSOD model from the perspectiv...
来源: 评论
HeavyTracker: An Efficient Algorithm for Heavy-Hitter Detection in High-Speed Networks
HeavyTracker: An Efficient Algorithm for Heavy-Hitter Detect...
收藏 引用
International Conference on Parallel and Distributed systems (ICPADS)
作者: Jiakun Yu Yu-E Sun He Huang Yang Du Guoju Gao Hongli Xu Shigang Chen School of Computer Science and Technology Soochow University Suzhou China School of Rail Transportation Soochow University Suzhou China Ministry of Education Key Laboratory of Embedded System and Service Computing (Tongji University) Shanghai China School of Computer Science and Technology University of Science and Technology of China Hefei China
Detecting heavy hitters that constitute the majority of network traffic is a critical task in network measurement. However, the highly skewed network traffic and the size-limited on-chip memory pose great challenges f... 详细信息
来源: 评论
Human action recognition using a time-delayed photonic reservoir computing
收藏 引用
science China(Information sciences) 2023年 第11期66卷 309-310页
作者: Chao KAI Pu LI Yi YANG Bingjie WANG K.Alan SHORE Yuncai WANG Key Laboratory of Advanced Transducers and Intelligent Control System Ministry of Education Taiyuan University of Technology Guangdong Provincial Key Laboratory of Photonics Information Technology School of Information Engineering School of Computer Science and Electronic Engineering Bangor University
Human action recognition(HAR) has important applications, including video retrieval, entertainment, autonomous navigation systems, and visual surveillance systems [1]. Unfortunately, accurate and efficient HAR remains...
来源: 评论