咨询与建议

限定检索结果

文献类型

  • 2,173 篇 会议
  • 1,780 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 3,967 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,780 篇 工学
    • 2,066 篇 计算机科学与技术...
    • 1,711 篇 软件工程
    • 518 篇 信息与通信工程
    • 335 篇 控制科学与工程
    • 242 篇 生物工程
    • 214 篇 电子科学与技术(可...
    • 207 篇 电气工程
    • 175 篇 机械工程
    • 163 篇 光学工程
    • 129 篇 生物医学工程(可授...
    • 109 篇 仪器科学与技术
    • 108 篇 化学工程与技术
    • 102 篇 材料科学与工程(可...
    • 95 篇 动力工程及工程热...
    • 79 篇 网络空间安全
    • 74 篇 建筑学
    • 69 篇 交通运输工程
    • 66 篇 土木工程
  • 1,279 篇 理学
    • 766 篇 数学
    • 271 篇 生物学
    • 249 篇 物理学
    • 202 篇 统计学(可授理学、...
    • 130 篇 系统科学
    • 119 篇 化学
  • 758 篇 管理学
    • 456 篇 管理科学与工程(可...
    • 346 篇 图书情报与档案管...
    • 158 篇 工商管理
  • 103 篇 医学
    • 90 篇 临床医学
    • 73 篇 基础医学(可授医学...
  • 84 篇 法学
    • 63 篇 社会学
  • 57 篇 经济学
  • 38 篇 农学
  • 22 篇 教育学
  • 11 篇 艺术学
  • 9 篇 军事学
  • 8 篇 文学
  • 6 篇 哲学

主题

  • 102 篇 semantics
  • 71 篇 software enginee...
  • 67 篇 computer science
  • 66 篇 training
  • 63 篇 computational mo...
  • 59 篇 deep learning
  • 59 篇 data mining
  • 53 篇 web services
  • 50 篇 optimization
  • 50 篇 feature extracti...
  • 49 篇 educational inst...
  • 46 篇 algorithm design...
  • 46 篇 clustering algor...
  • 46 篇 software
  • 44 篇 machine learning
  • 41 篇 laboratories
  • 40 篇 cloud computing
  • 40 篇 data models
  • 38 篇 quality of servi...
  • 37 篇 authentication

机构

  • 295 篇 state key labora...
  • 220 篇 school of comput...
  • 204 篇 state key labora...
  • 150 篇 state key labora...
  • 108 篇 state key labora...
  • 90 篇 school of comput...
  • 87 篇 state key labora...
  • 84 篇 state key lab. o...
  • 74 篇 state key lab of...
  • 70 篇 school of comput...
  • 69 篇 computer school ...
  • 63 篇 state key lab. f...
  • 57 篇 university of ch...
  • 53 篇 school of comput...
  • 50 篇 state key labora...
  • 47 篇 state key labora...
  • 45 篇 school of comput...
  • 42 篇 department of co...
  • 42 篇 state key labora...
  • 41 篇 school of comput...

作者

  • 42 篇 xiao limin
  • 40 篇 huang di
  • 35 篇 gao yang
  • 35 篇 shi yinghuan
  • 32 篇 limin xiao
  • 29 篇 ruan li
  • 29 篇 liu jin
  • 25 篇 dou wanchun
  • 23 篇 bai xiao
  • 22 篇 tao dacheng
  • 22 篇 qi lei
  • 21 篇 he keqing
  • 21 篇 zhao jian
  • 21 篇 xu xiaolong
  • 20 篇 shen furao
  • 20 篇 qi lianyong
  • 20 篇 li bing
  • 20 篇 jin liu
  • 20 篇 du bo
  • 19 篇 xu baowen

语言

  • 3,476 篇 英文
  • 394 篇 其他
  • 99 篇 中文
  • 1 篇 法文
检索条件"机构=State Key Lab of Software Engineering and School of Computer"
3967 条 记 录,以下是1011-1020 订阅
排序:
Efficient Quantum Circuits for Machine Learning Activation Functions including Constant T-depth ReLU
arXiv
收藏 引用
arXiv 2024年
作者: Zi, Wei Wang, Siyi Kim, Hyunji Sun, Xiaoming Chattopadhyay, Anupam Rebentrost, Patrick State Key Lab of Processors Institute of Computing Technology Chinese Academy of Sciences Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China School of Computer Science and Engineering Nanyang Technological University Singapore Hansung University Seoul Korea Republic of Centre for Quantum Technologies National University of Singapore Singapore School of Computing National University of Singapore Singapore
In recent years, Quantum Machine Learning (QML) has increasingly captured the interest of researchers. Among the components in this domain, activation functions hold a fundamental and indispensable role. Our research ... 详细信息
来源: 评论
All Grains, One Scheme (AGOS): Learning Multi-grain Instance Representation for Aerial Scene Classification
arXiv
收藏 引用
arXiv 2022年
作者: Bi, Qi Zhou, Beichen Qin, Kun Ye, Qinghao Xia, Gui-Song School of Remote Sensing and Information Engineering Wuhan University Wuhan China University of California San Diego United States The National Engineering Research Center for Multimedia Software School of Computer Science Institute of Artificial Intelligence China The State Key Lab. LIESMARS Wuhan University Wuhan China
Aerial scene classification remains challenging as: 1) the size of key objects in determining the scene scheme varies greatly;2) many objects irrelevant to the scene scheme are often flooded in the image. Hence, how t... 详细信息
来源: 评论
Positive unlabeled learning with class-prior approximation  29
Positive unlabeled learning with class-prior approximation
收藏 引用
29th International Joint Conference on Artificial Intelligence, IJCAI 2020
作者: Chang, Shizhen Du, Bo Zhang, Liangpei School of Computer Science State Key Lab of Information Engineering on Survey Mapping and Remote Sensing Institute of Artificial Intelligence National Engineering Research Center for Multimedia Software Wuhan University China
The positive unlabeled (PU) learning aims to train a binary classifier from a set of positive labeled samples and other unlabeled samples. Much research has been done on this special branch of weakly supervised classi... 详细信息
来源: 评论
The diversity and ecological significance of microbial traits potentially involved in B_(12) biosynthesis in the global ocean
收藏 引用
mLife 2023年 第4期2卷 416-427页
作者: Jiayin Zhou Wei Qin Xinda Lu Yunfeng Yang David Stahl Nianzhi Jiao Jizhong Zhou Jihua Liu Qichao Tu Institute of Marine Science and Technology Shandong UniversityQingdaoChina Joint Lab for Ocean Research and Education at Dalhousie University Shandong University and Xiamen UniversityQingdaoChina School of Biological Sciences University of OklahomaNormanOklahomaUSA Department of Civil and Environmental Engineering Massachusetts Institute of TechnologyCambridgeMassachusettsUSA State Key Joint Laboratory of Environment Simulation and Pollution Control School of EnvironmentTsinghua UniversityBeijingChina Department of Civil and Environmental Engineering University of WashingtonSeattleWashingtonUSA Institute of Marine Microbes and Ecospheres Xiamen UniversityXiamenChina Earth and Environmental Sciences Lawrence Berkeley NationalLaboratoryBerkeley CaliforniaUSA Institutefr Environmental Genomics University of OklahomaNormanOklahomaUSA School of Civil Engineering and Environmental Sciences University of OklahomaNormanOklahomaUSA School of Computer Sciences University of OklahomaNormanOklahomaUSA DermBiont Inc. BostonMassachusettsUSA
Cobalamin(B_(12)),an essential nutrient and growth cofactor for many living organisms on Earth,can be fully synthesized only by selected prokaryotes in ***,microbial communities related to B_(12) biosynthesis could se... 详细信息
来源: 评论
Multi-Temporal Relationship Inference in Urban Areas
arXiv
收藏 引用
arXiv 2023年
作者: Li, Shuangli Zhou, Jingbo Liu, Ji Xu, Tong Chen, Enhong Xiong, Hui School of Computer Science and Technology University of Science and Technology of China Baidu Research China Business Intelligence Lab Baidu Research China Big Data Lab Baidu Research China School of Computer Science and Technology University of Science and Technology of China State Key Laboratory of Cognitive Intelligence China Anhui Province Key Laboratory of Big Data Analysis and Application University of Science and Technology of China State Key Laboratory of Cognitive Intelligence China The Department of Computer Science and Engineering The Hong Kong University of Science and Technology China
Finding multiple temporal relationships among locations can benefit a bunch of urban applications, such as dynamic offline advertising and smart public transport planning. While some efforts have been made on finding ... 详细信息
来源: 评论
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Xiaogeng Li, Minghui Wang, Haoyu Hu, Shengshan Ye, Dengpan Jin, Hai Wu, Libing Xiao, Chaowei School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab China School of Cyber Science and Engineering Wuhan University China Arizona State University United States
Deep neural networks are proven to be vulnerable to backdoor attacks. Detecting the trigger samples during the inference stage, i.e., the test-time trigger sample detection, can prevent the backdoor from being trigger... 详细信息
来源: 评论
AIDE: Attack Inference Based on Heterogeneous Dependency Graphs with MITRE ATT&CK
AIDE: Attack Inference Based on Heterogeneous Dependency Gra...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Weidong Zhou Chunhe Xia Nan Feng Xinyi Pan Tianbo Wang Xiaojian Li Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Software & Microelectronics Peking University Beijing China School of Cyber Science and Technology Beihang University Beijing China School of Computer Science and Engineering Guangxi Normal University Guilin China
The MITRE ATT&CK Framework provides a rich and actionable repository of adversarial tactics, techniques, and procedures (TTPs). By leveraging the associations among these techniques, we can infer unobserved techni... 详细信息
来源: 评论
A Many-Objective Evolutionary Algorithm Assisted by Ideal Hyperplane
SSRN
收藏 引用
SSRN 2022年
作者: Zhang, Zhixia Wen, Jie Wang, Hui Cai, Xingjuan Cui, Zhihua Zhang, Wensheng School of Computer Science and Technology Taiyuan University of Science and Technology China School of Information Engineering Nanchang Institute of Technology Nanchang330099 China State Key Laboratory of Intelligent Control and Management of Complex System Institute of Automation Chinese Academy of Sciences China State Key Lab. for Novel Software Technology Nanjing University China
In many-objective optimization problems (MaOPs), it is a difficult task for evolutionary algorithms to balance convergence and diversity while rapidly converging to the Pareto front. As the number of objectives increa... 详细信息
来源: 评论
DISTDET: a cost-effective distributed cyber threat detection system  23
DISTDET: a cost-effective distributed cyber threat detection...
收藏 引用
Proceedings of the 32nd USENIX Conference on Security Symposium
作者: Feng Dong Liu Wang Xu Nie Fei Shao Haoyu Wang Ding Li Xiapu Luo Xusheng Xiao School of Cyber Science and Engineering Huazhong University of Science and Technology and Sangfor Technologies Inc Beijing University of Posts and Telecommunications Case Western Reserve University School of Cyber Science and Engineering Huazhong University of Science and Technology Key Laboratory of High-Confidence Software Technologies (MOE) School of Computer Science Peking University The Hong Kong Polytechnic University Arizona State University
Building provenance graph that considers causal relationships among software behaviors can better provide contextual information of cyber attacks, especially for advanced attacks such as Advanced Persistent Threat (AP...
来源: 评论
Deep Reinforcement Learning for Energy-Efficient Fresh Data Collection in Rechargeable UAV-assisted IoT Networks
Deep Reinforcement Learning for Energy-Efficient Fresh Data ...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Mengjie Yi Xijun Wang Juan Liu Yan Zhang Ronghui Hou School of Cyber Engineering Xidian University Xi’an China School of Electronics and Information Technology Sun Yat-sen University Guangzhou China School of Electrical Engineering and Computer Science Ningbo University Zhejiang China State Key Lab of Integrated Service Networks Information Science Institute Xidian University Xi’an China
The unmanned aerial vehicle (UAV) can act as the edge server in delay-sensitive monitoring for data collection and processing in the Internet of things (IoT) networks due to its flexibility and low operational cost. O... 详细信息
来源: 评论