咨询与建议

限定检索结果

文献类型

  • 108 篇 会议
  • 104 篇 期刊文献

馆藏范围

  • 212 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 168 篇 工学
    • 125 篇 计算机科学与技术...
    • 105 篇 软件工程
    • 31 篇 信息与通信工程
    • 22 篇 控制科学与工程
    • 14 篇 机械工程
    • 12 篇 生物工程
    • 11 篇 光学工程
    • 11 篇 生物医学工程(可授...
    • 8 篇 材料科学与工程(可...
    • 8 篇 电子科学与技术(可...
    • 7 篇 动力工程及工程热...
    • 7 篇 电气工程
    • 7 篇 化学工程与技术
    • 7 篇 交通运输工程
    • 6 篇 仪器科学与技术
    • 6 篇 建筑学
    • 5 篇 土木工程
  • 65 篇 理学
    • 28 篇 数学
    • 17 篇 生物学
    • 11 篇 统计学(可授理学、...
    • 10 篇 物理学
    • 9 篇 化学
    • 9 篇 系统科学
  • 40 篇 管理学
    • 23 篇 管理科学与工程(可...
    • 20 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 13 篇 医学
    • 12 篇 临床医学
    • 9 篇 基础医学(可授医学...
    • 7 篇 药学(可授医学、理...
  • 8 篇 法学
    • 6 篇 法学
  • 3 篇 经济学
  • 3 篇 农学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 5 篇 semantics
  • 4 篇 computational mo...
  • 4 篇 machine learning
  • 4 篇 blockchain
  • 3 篇 scalability
  • 3 篇 regression analy...
  • 3 篇 computer archite...
  • 3 篇 big data
  • 3 篇 software as a se...
  • 3 篇 stochastic syste...
  • 3 篇 students
  • 3 篇 cloud computing
  • 3 篇 forecasting
  • 3 篇 data models
  • 2 篇 surveys
  • 2 篇 object detection
  • 2 篇 reinforcement le...
  • 2 篇 deep learning
  • 2 篇 deep neural netw...
  • 2 篇 safety

机构

  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 21 篇 school of comput...
  • 17 篇 state key labora...
  • 8 篇 beijing advanced...
  • 7 篇 department of co...
  • 5 篇 university of ch...
  • 5 篇 state key lab of...
  • 4 篇 state key labora...
  • 4 篇 state key lab. o...
  • 4 篇 state key labora...
  • 4 篇 zhongguancun lab...
  • 4 篇 state key labora...
  • 3 篇 department of co...
  • 3 篇 hedps capt colle...
  • 3 篇 state key lab.of...
  • 3 篇 department of in...
  • 3 篇 school of comput...
  • 3 篇 department of co...
  • 3 篇 state key lab of...

作者

  • 8 篇 peng hao
  • 8 篇 li zhoujun
  • 8 篇 liu xianglong
  • 7 篇 xu ke
  • 6 篇 shilong ma
  • 6 篇 yu philip s.
  • 5 篇 tao dacheng
  • 4 篇 li jianxin
  • 4 篇 xu jun
  • 4 篇 gong ruihao
  • 4 篇 rui li
  • 4 篇 wenjun wu
  • 4 篇 wu wenjun
  • 3 篇 zhang duo
  • 3 篇 cai chun
  • 3 篇 zhang linfeng
  • 3 篇 liang peng
  • 3 篇 bai xiao
  • 3 篇 york darrin m.
  • 3 篇 meikang qiu

语言

  • 188 篇 英文
  • 23 篇 其他
  • 2 篇 中文
检索条件"机构=State Key Lab of Software Development Environment Department of Computer Science and Engineering"
212 条 记 录,以下是21-30 订阅
排序:
Enhancing the Transferability of Adversarial Attacks with Stealth Preservation
Enhancing the Transferability of Adversarial Attacks with St...
收藏 引用
IEEE computer Society Conference on computer Vision and Pattern Recognition Workshops (CVPRW)
作者: Xinwei Zhang Tianyuan Zhang Yitong Zhang Shuangcheng Liu School of Computer Science and Engineering Beihang University Beijing China State Key Lab of Software Development Environment Beihang University Beijing China Shen Yuan Honors College Beihang University Beijing China
Deep neural networks are susceptible to attacks from adversarial examples in recent years. Especially, the black-box attacks cause a more serious threat to practical applications. However, while most existing black-bo... 详细信息
来源: 评论
PriSTI: A Conditional Diffusion Framework for Spatiotemporal Imputation
PriSTI: A Conditional Diffusion Framework for Spatiotemporal...
收藏 引用
International Conference on Data engineering
作者: Mingzhe Liu Han Huang Hao Feng Leilei Sun Bowen Du Yanjie Fu State Key Laboratory of Software Development Environment Beihang University Beijing China Department of Computer Science University of Central Florida USA
Spatiotemporal data mining plays an important role in air quality monitoring, crowd flow modeling, and climate forecasting. However, the originally collected spatiotemporal data in real-world scenarios is usually inco...
来源: 评论
SCPS:A Secure and Copyright-Preserving System for IIoT Based on Hyperledger Fabric  9
SCPS:A Secure and Copyright-Preserving System for IIoT Based...
收藏 引用
9th International Conference on Advanced Cloud and Big Data, CBD 2021
作者: Peng, Jiahui Li, Chunpei Yuan, Bo Meng, Hongwei Yu, Feng Li, Xianxian Guangxi Normal University Guangxi Key Lab of Multi-Source Information Mining Security GuiLin China Beihang University Development Environment School of Computer Science and Engineering State Key Laboratory of Software Beijing100191 China Xiong'An Intelligent City Innovation Federation Blockchain Lab Beijing China
Data, a key asset in Industrial Internet of Things(IIoT), has fueled the emergence of a new data trading in-dustry, which can be collected and traded for better development of IIoT. However, copyright protection is no... 详细信息
来源: 评论
computer-Vision-Based Non-Contact Paste Concentration Measurement*
Computer-Vision-Based Non-Contact Paste Concentration Measur...
收藏 引用
Automation in Manufacturing, Transportation and Logistics (ICaMaL), International Conference on
作者: Tailin Liang Zhaolin Yuan State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing China Department of Industrial and Systems Engineering Research Institute of Advanced Manufacturing The Hong Kong Polytechnic University Hong Kong China
For monitoring the paste concentration, existing techniques, such as ultrasonic concentration meters and neutron meters, suffer from radiation hazards and low precision in high concentrations. This paper proposes a no... 详细信息
来源: 评论
Attack End-to-End Autonomous Driving through Module-Wise Noise
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Lu Zhang, Tianyuan Han, Yikai Fang, Muyang Jin, Ting Kang, Jiaqi School of Computer Science and Engineering Beihang University Beijing China Shen Yuan Honors College Beihang University Beijing China State Key Lab of Software Development Environment Beihang University Beijing China School of Software Beihang University Beijing China
With recent breakthroughs in deep neural networks, numerous tasks within autonomous driving have exhibited remarkable performance. However, deep learning models are susceptible to adversarial attacks, presenting signi... 详细信息
来源: 评论
Authentic Learning of Machine Learning in Cybersecurity with Portable Hands-on labware: Neural Network Algorithms for Network Denial of Service (DOS) Detection
Authentic Learning of Machine Learning in Cybersecurity with...
收藏 引用
2022 IEEE International Conference on Big Data, Big Data 2022
作者: Faruk, Md Jobair Hossain Shahriar, Hossain Qian, Kai Lo, Dan Whitman, Michael Cuzzocrea, Alfredo Wu, Fan Clincy, Victor Department of Software Engineering and Game Development Kennesaw State University United States Department of Information Technology Kennesaw State University United States Institute for Cyber Workforce Development Kennesaw State University United States Department Computer Science Kennesaw State University United States IDEA Lab University of Calabria Rende Italy Loria Nancy France Department of Computer Science Tuskegee University United States
The primary goal of the authentic learning approach is to engage and motivate students in a learning environment that encourages all students in learning. This approach provides students with hands-on experiences in s... 详细信息
来源: 评论
Temporal Feature Matters: A Framework for Diffusion Model Quantization
arXiv
收藏 引用
arXiv 2024年
作者: Huang, Yushi Gong, Ruihao Liu, Xianglong Liu, Jing Li, Yuhang Lu, Jiwen Tao, Dacheng Electrical and Computer Engineering Department Hong Kong University of Science and Technology Hong Kong State Key Laboratory of Software Development Environment Beihang University China Department of Data Science and AI Faculty of IT Monash University Australia Electrical Engineering Department Yale University United States Department of Automation Tsinghua University China School of Computer Science and Engineering Nanyang Technological University Singapore
The Diffusion models, widely used for image generation, face significant challenges related to their broad applicability due to prolonged inference times and high memory demands. Efficient Post-Training Quantization (... 详细信息
来源: 评论
Hierarchical state Abstraction Based on Structural Information Principles
arXiv
收藏 引用
arXiv 2023年
作者: Zeng, Xianghua Peng, Hao Li, Angsheng Liu, Chunyang He, Lifang Yu, Philip S. State Key Laboratory of Software Development Environment Beihang University China Zhongguancun Laboratory China Didi Chuxing China Computer Science & Engineering Lehigh University United States Department of Computer Science University of Illinois at Chicago United States
state abstraction optimizes decision-making by ignoring irrelevant environmental information in reinforcement learning with rich observations. Nevertheless, recent approaches focus on adequate representational capacit... 详细信息
来源: 评论
Student-Teacher Feature Pyramid Matching for Anomaly Detection  32
Student-Teacher Feature Pyramid Matching for Anomaly Detecti...
收藏 引用
32nd British Machine Vision Conference, BMVC 2021
作者: Wang, Guodong Han, Shumin Ding, Errui Huang, Di State Key Laboratory of Software Development Environment Beihang University Beijing China School of Computer Science and Engineering Beihang University Beijing China Department of Computer Vision Technology Baidu Inc. Beijing China
Anomaly detection is a challenging task and usually formulated as an one-class learning problem for the unexpectedness of anomalies. This paper proposes a simple yet powerful approach to this issue, which is implement... 详细信息
来源: 评论
Evaluating Open-Domain Dialogues in Latent Space with Next Sentence Prediction and Mutual Information
arXiv
收藏 引用
arXiv 2023年
作者: Zhao, Kun Yang, Bohao Lin, Chenghua Rong, Wenge Villavicencio, Aline Cui, Xiaohui Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University China Department of Computer Science The University of Sheffield United Kingdom State Key Laboratory of Software Development Environment Beihang University China School of Computer Science and Engineering Beihang University China
The long-standing one-to-many issue of the open-domain dialogues poses significant challenges for automatic evaluation methods, i.e., there may be multiple suitable responses which differ in semantics for a given conv... 详细信息
来源: 评论