咨询与建议

限定检索结果

文献类型

  • 664 篇 会议
  • 361 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 1,032 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 633 篇 工学
    • 480 篇 计算机科学与技术...
    • 391 篇 软件工程
    • 124 篇 信息与通信工程
    • 87 篇 控制科学与工程
    • 67 篇 生物工程
    • 65 篇 电气工程
    • 44 篇 机械工程
    • 42 篇 生物医学工程(可授...
    • 37 篇 电子科学与技术(可...
    • 29 篇 仪器科学与技术
    • 27 篇 光学工程
    • 26 篇 交通运输工程
    • 25 篇 化学工程与技术
    • 23 篇 土木工程
    • 18 篇 动力工程及工程热...
    • 18 篇 网络空间安全
    • 15 篇 建筑学
  • 305 篇 理学
    • 163 篇 数学
    • 72 篇 生物学
    • 59 篇 物理学
    • 52 篇 统计学(可授理学、...
    • 36 篇 系统科学
    • 29 篇 化学
  • 215 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 96 篇 图书情报与档案管...
    • 51 篇 工商管理
  • 27 篇 医学
    • 22 篇 临床医学
    • 14 篇 基础医学(可授医学...
  • 19 篇 法学
    • 18 篇 社会学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 8 篇 农学
  • 5 篇 教育学
  • 5 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 51 篇 computer science
  • 37 篇 software enginee...
  • 31 篇 training
  • 30 篇 feature extracti...
  • 30 篇 accuracy
  • 25 篇 deep learning
  • 22 篇 semantics
  • 22 篇 software
  • 18 篇 laboratories
  • 17 篇 neural networks
  • 16 篇 reliability
  • 16 篇 predictive model...
  • 14 篇 software systems
  • 14 篇 data mining
  • 13 篇 quality of servi...
  • 13 篇 optimization
  • 13 篇 wireless sensor ...
  • 13 篇 computational mo...
  • 13 篇 machine learning
  • 13 篇 testing

机构

  • 103 篇 national enginee...
  • 101 篇 college of compu...
  • 32 篇 shenzhen city ke...
  • 25 篇 school of comput...
  • 23 篇 department of co...
  • 22 篇 school of comput...
  • 22 篇 school of softwa...
  • 22 篇 guangdong provin...
  • 20 篇 school of cyber ...
  • 17 篇 shenzhen univers...
  • 16 篇 hubei key labora...
  • 16 篇 national enginee...
  • 16 篇 hubei engineerin...
  • 15 篇 services computi...
  • 15 篇 key laboratory o...
  • 14 篇 shenzhen institu...
  • 14 篇 cluster and grid...
  • 13 篇 tianjin key labo...
  • 12 篇 department of co...
  • 12 篇 school of comput...

作者

  • 42 篇 shen linlin
  • 21 篇 ji zhen
  • 19 篇 linlin shen
  • 19 篇 li jianqiang
  • 17 篇 zhen ji
  • 14 篇 hu shengshan
  • 14 篇 li minghui
  • 13 篇 yunhao liu
  • 13 篇 gao can
  • 12 篇 wang jinbao
  • 12 篇 li yan
  • 12 篇 jianqiang li
  • 12 篇 yu hang
  • 12 篇 hai jin
  • 12 篇 jin hai
  • 11 篇 tutut herawan
  • 11 篇 philippe charlan...
  • 11 篇 zhu zexuan
  • 11 篇 juergen rilling
  • 10 篇 jiang lai

语言

  • 957 篇 英文
  • 60 篇 其他
  • 16 篇 中文
  • 1 篇 德文
检索条件"机构=Software System LaboratoryDepartment of Computer Science Engineering"
1032 条 记 录,以下是161-170 订阅
排序:
PB-UAP: Hybride Universal Adversarial Attack for Image Segmentation
PB-UAP: Hybride Universal Adversarial Attack for Image Segme...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yufei Song Ziqi Zhou Minghui Li Xianlong Wang Hangtao Zhang Menghao Deng Wei Wan Shengshan Hu Leo Yu Zhang Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
With the rapid advancement of deep learning, the model robustness has become a significant research hotspot, i.e., adversarial attacks on deep neural networks. Existing works primarily focus on image classification ta... 详细信息
来源: 评论
Personalized Federated Learning with Enhanced Implicit Generalization
Personalized Federated Learning with Enhanced Implicit Gener...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Heping Liu Songbai Liu Junkai Ji Qiuzhen Lin Jianyong Chen Kay Chen Tan College of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Department of Computing The Hong Kong Polytechnic University
Integrating personalization into federated learning is crucial for addressing data heterogeneity and surpassing the limitations of a single aggregated model. Personalized federated learning excels at capturing inter-c... 详细信息
来源: 评论
Research on Fault Diagnosis Method Based on Structural Causal Model in Tennessee Eastman Process  7th
Research on Fault Diagnosis Method Based on Structural Causa...
收藏 引用
7th International Conference on Computing, Control and Industrial engineering, CCIE 2023
作者: Pu, Haoyuan Liu, Jie Chen, Zhi Yang, Xiaohua Ren, Changan Xu, Zhuoran Jian, Yifan School of Computer Science University of South China Hengyang China Science and Technology on Reactor System Design Technology Laboratory Nuclear Power Institute of China Chengdu China Intelligent Equipment Software Evaluation Engineering Technology Research Center of Hunan Hengyang China CNNC Key Laboratory on High Trusted Computing Hengyang China School of Nuclear Science and Technology University of South China Hengyang China
In the practical application of fault diagnosis in large-scale chemical systems, due to the danger of faults, the machine learning diagnosis methods used in current research often face the problem of scarcity of fault... 详细信息
来源: 评论
Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation
arXiv
收藏 引用
arXiv 2024年
作者: Chu, Zhaoyang Wan, Yao Li, Qian Wu, Yang Zhang, Hongyu Sui, Yulei Xu, Guandong Jin, Hai School of Computer Science and Technology Huazhong University of Science and Technology China School of Electrical Engineering Computing and Mathematical Sciences Curtin University Australia School of Big Data and Software Engineering Chongqing University China School of Computer Science and Engineering University of New South Wales Australia School of Computer Science University of Technology Sydney Australia National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan430074 China
Vulnerability detection is crucial for ensuring the security and reliability of software systems. Recently, Graph Neural Networks (GNNs) have emerged as a prominent code embedding approach for vulnerability detection,... 详细信息
来源: 评论
Spatial-Temporal Graph-Based AU Relationship Learning for Facial Action Unit Detection
Spatial-Temporal Graph-Based AU Relationship Learning for Fa...
收藏 引用
IEEE computer Society Conference on computer Vision and Pattern Recognition Workshops (CVPRW)
作者: Zihan Wang Siyang Song Cheng Luo Yuzhi Zhou Shiling Wu Weicheng Xie Linlin Shen Computer Vision Institute School of Computer Science & Software Engineering Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen University School of Computing and Mathematical Sciences University of Leicester
This paper presents our Facial Action Units (AUs) detection submission to the fifth Affective Behavior Analysis in-the-wild Competition (ABAW). Our approach consists of three main modules: (i) a pre-trained facial rep...
来源: 评论
Mudahnya BM: A Context-Aware Mobile Cloud Learning Application Using Semantic-Based Approach
Mudahnya BM: A Context-Aware Mobile Cloud Learning Applicati...
收藏 引用
7th International Conference on Advances in Visual Informatics, IVIC 2021
作者: Muhammad, Sufri Admodisastro, Novia Osman, Hafeez Mohd Ali, Norhayati Faculty of Computer Science and Information Technology Department of Software Engineering and Information System Universiti Putra Malaysia Seri Kembangan Selangor43400 Malaysia
A great potential of various learning environment in mobile learning application can clearly be seen in current pandemic situation. The accessibility of the learning resources needs to be available from anywhere anyti... 详细信息
来源: 评论
Differential testing for machine learning: an analysis for classification algorithms beyond deep learning
arXiv
收藏 引用
arXiv 2022年
作者: Herbold, Steffen Tunkel, Steffen Institute of Software and System Engineering TU Clausthal Germany Institute of Computer Science University of Goettingen Germany
Context: Differential testing is a useful approach that uses different implementations of the same algorithms and compares the results for software testing. In recent years, this approach was successfully used for tes... 详细信息
来源: 评论
Identify the potential pathways and candidate biomarkers of stroke associated with bipolar disorder: Bioinformatics and system biology approach
收藏 引用
Journal of Proteins and Proteomics 2025年 第2期16卷 141-159页
作者: Hosen, Md. Faruk Basar, Md. Abul Yasmin, Mst. Farjana Hasan, Md. Rakibul Uddin, Muhammad Shahin Department of Information and Communication Technology (ICT) Mawlana Bhashani Science and Technology University (MBSTU) Tangail Bangladesh Department of Computing and Information System (CIS) Daffodil International University (DIU) Dhaka Bangladesh Department of Computer Science and Engineering (CSE) Uttara University Dhaka Bangladesh Department of Software Engineering (SWE) Daffodil International University (DIU) Dhaka Bangladesh
The field of computational bioinformatics and systems biology analysis is rapidly expanding due to advancements in bioinformatics tools. Bipolar disorder (BD) is a severe psychiatric condition affecting both adults an...
来源: 评论
The Parables of the Mustard Seed and the Yeast: Extremely Low-Budget, High-Performance Nighttime Semantic Segmentation  39
The Parables of the Mustard Seed and the Yeast: Extremely Lo...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Wang, Shiqin Xu, Xin Chen, Haoyang Jiang, Kui Wang, Zheng School of Computer Science and Technology Wuhan University of Science and Technology Wuhan 430065 China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System China National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University China School of Computer Science and Technology Harbin Institute of Technology Harbin 150001 China
Nighttime Semantic Segmentation (NSS) is essential to many cutting-edge vision applications. However, existing technologies overly rely on massive labeled data, whose annotation is time-consuming and laborious. In thi... 详细信息
来源: 评论
GCD-Sampling: A General Cross-scale Decoupled Sampling for Point Cloud  39
GCD-Sampling: A General Cross-scale Decoupled Sampling for P...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Dai, Tao Wang, Yanzi Xiong, Jianyu Zha, Yaohua Xia, Shu-Tao Zhu, Zexuan College of Computer Science and Software Engineering Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Tsinghua Shenzhen International Graduate School Tsinghua University China Shenzhen City Key Laboratory of Embedded System Design Shenzhen China
Sampling strategy (e.g., fixed farthest point sampling) of point cloud has been an essential step for developing practical solutions in 3D computer vision tasks. Previous fixed sampling is simple, but suffer from subo... 详细信息
来源: 评论