咨询与建议

限定检索结果

文献类型

  • 2,171 篇 会议
  • 1,782 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 3,967 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,796 篇 工学
    • 2,086 篇 计算机科学与技术...
    • 1,714 篇 软件工程
    • 523 篇 信息与通信工程
    • 356 篇 控制科学与工程
    • 243 篇 生物工程
    • 214 篇 电子科学与技术(可...
    • 208 篇 电气工程
    • 174 篇 机械工程
    • 163 篇 光学工程
    • 129 篇 生物医学工程(可授...
    • 109 篇 仪器科学与技术
    • 109 篇 化学工程与技术
    • 101 篇 材料科学与工程(可...
    • 96 篇 动力工程及工程热...
    • 79 篇 网络空间安全
    • 71 篇 建筑学
    • 69 篇 交通运输工程
    • 63 篇 土木工程
  • 1,282 篇 理学
    • 768 篇 数学
    • 272 篇 生物学
    • 246 篇 物理学
    • 200 篇 统计学(可授理学、...
    • 132 篇 系统科学
    • 121 篇 化学
  • 758 篇 管理学
    • 456 篇 管理科学与工程(可...
    • 345 篇 图书情报与档案管...
    • 157 篇 工商管理
  • 104 篇 医学
    • 92 篇 临床医学
    • 74 篇 基础医学(可授医学...
  • 84 篇 法学
    • 63 篇 社会学
  • 57 篇 经济学
  • 38 篇 农学
  • 22 篇 教育学
  • 11 篇 艺术学
  • 9 篇 军事学
  • 8 篇 文学
  • 6 篇 哲学

主题

  • 102 篇 semantics
  • 69 篇 software enginee...
  • 67 篇 computer science
  • 65 篇 training
  • 62 篇 computational mo...
  • 58 篇 deep learning
  • 58 篇 data mining
  • 54 篇 web services
  • 50 篇 optimization
  • 49 篇 educational inst...
  • 49 篇 feature extracti...
  • 46 篇 algorithm design...
  • 46 篇 clustering algor...
  • 45 篇 machine learning
  • 45 篇 software
  • 40 篇 laboratories
  • 40 篇 cloud computing
  • 39 篇 data models
  • 38 篇 accuracy
  • 37 篇 quality of servi...

机构

  • 298 篇 state key labora...
  • 216 篇 school of comput...
  • 200 篇 state key labora...
  • 150 篇 state key labora...
  • 106 篇 state key labora...
  • 89 篇 state key labora...
  • 86 篇 school of comput...
  • 85 篇 state key lab. o...
  • 74 篇 state key lab of...
  • 71 篇 school of comput...
  • 69 篇 computer school ...
  • 65 篇 state key lab. f...
  • 57 篇 university of ch...
  • 52 篇 school of comput...
  • 49 篇 state key labora...
  • 46 篇 state key labora...
  • 45 篇 school of comput...
  • 43 篇 state key labora...
  • 40 篇 department of co...
  • 40 篇 international sc...

作者

  • 41 篇 huang di
  • 41 篇 xiao limin
  • 35 篇 gao yang
  • 35 篇 shi yinghuan
  • 32 篇 liu jin
  • 31 篇 limin xiao
  • 30 篇 ruan li
  • 27 篇 dou wanchun
  • 23 篇 bai xiao
  • 22 篇 tao dacheng
  • 22 篇 xu xiaolong
  • 21 篇 he keqing
  • 21 篇 zhao jian
  • 21 篇 qi lianyong
  • 21 篇 li yuanxiang
  • 21 篇 qi lei
  • 20 篇 shen furao
  • 20 篇 li bing
  • 20 篇 he yanxiang
  • 20 篇 du bo

语言

  • 3,637 篇 英文
  • 226 篇 其他
  • 105 篇 中文
  • 1 篇 法文
检索条件"机构=State Key Lab of Software Engineering and School of Computer"
3967 条 记 录,以下是731-740 订阅
排序:
Heterophily-Aware Graph Attention Network
SSRN
收藏 引用
SSRN 2023年
作者: Wang, Junfu Guo, Yuanfang Yang, Liang Wang, Yunhong State Key Laboratory of Software Development Environment Beihang University Beijing100191 China School of Computer Science and Engineering Beihang University Beijing100191 China School of Artificial Intelligence Hebei University of Technology Tianjin300401 China
Graph Neural Networks (GNNs) have shown remarkable success in graph representation learning. Unfortunately, current weight assignment schemes in standard GNNs, such as the calculation based on node degrees or pair-wis... 详细信息
来源: 评论
INITNO: Boosting Text-to-Image Diffusion Models via Initial Noise Optimization
arXiv
收藏 引用
arXiv 2024年
作者: Guo, Xiefan Liu, Jinlin Cui, Miaomiao Li, Jiankai Yang, Hongyu Huang, Di State Key Laboratory of Software Development Environment Beihang University Beijing China School of Computer Science and Engineering Beihang University Beijing China Institute of Artificial Intelligence Beihang University Beijing China Shanghai Artificial Intelligence Laboratory Shanghai China
Recent strides in the development of diffusion models, exemplified by advancements such as Stable Diffusion, have underscored their remarkable prowess in generating visually compelling images. However, the imperative ... 详细信息
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
Why Does Little Robustness Help? A Further Step Towards Unde...
收藏 引用
IEEE Symposium on Security and Privacy
作者: Yechao Zhang Shengshan Hu Leo Yu Zhang Junyu Shi Minghui Li Xiaogeng Liu Wei Wan Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University School of Software Engineering Huazhong University of Science and Technology Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology
Adversarial examples for deep neural networks (DNNs) are transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectures. Although a bun... 详细信息
来源: 评论
Initno: Boosting Text-to-Image Diffusion Models via Initial Noise Optimization
Initno: Boosting Text-to-Image Diffusion Models via Initial ...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Xiefan Guo Jinlin Liu Miaomiao Cui Jiankai Li Hongyu Yang Di Huang State Key Laboratory of Software Development Environment Beihang University Beijing China School of Computer Science and Engineering Beihang University Beijing China Institute of Artificial Intelligence Beihang University Beijing China Shanghai Artificial Intelligence Laboratory Shanghai China
Recent strides in the development of diffusion models, ex-emplified by advancements such as Stable Diffusion, have underscored their remarkable prowess in generating visu-ally compelling images. However, the imperativ... 详细信息
来源: 评论
PEFN: A Patches Enhancement and Hierarchical Fusion Network for Robust Vehicle Re-Identification
收藏 引用
IEEE Internet of Things Journal 2025年
作者: He, Wenying Wang, Feiyu Bai, Yude Xiong, Neal N. Xu, Guangquan Guo, Fei Hebei University of Technology School of Artificial Intelligence Tianjin300401 China Hebei University of Technology Hebei Province Key Laboratory of Big Data Calculation Tianjin300130 China Tiangong University School of Software Tianjin300387 China Northeastern State University Department of Mathematics and Computer Science TahlequahOK74464 United States Tianjin300350 China Central South University School of Computer Science and Engineering Changsha410083 China
Vehicle Re-Identification (Re-ID), which is a significant application in the Internet of Things, aims to accurately retrieve the remaining images of a given vehicle across different cameras views. The improvement in v... 详细信息
来源: 评论
NeRFTAP: Enhancing Transferability of Adversarial Patches on Face Recognition using Neural Radiance Fields
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Xiaoliang Shen, Furao Han, Feng Zhao, Jian Nie, Changhai State Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science and Technology Nanjing University China School of Artificial Intelligence Nanjing University China School of Electronic Science and Engineering Nanjing University China
Face recognition (FR) technology plays a crucial role in various applications, but its vulnerability to adversarial attacks poses significant security concerns. Existing research primarily focuses on transferability t... 详细信息
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
Securely Fine-tuning Pre-trained Encoders Against Adversaria...
收藏 引用
IEEE Symposium on Security and Privacy
作者: Ziqi Zhou Minghui Li Wei Liu Shengshan Hu Yechao Zhang Wei Wan Lulu Xue Leo Yu Zhang Dezhong Yao Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
DeepCL: Deep Change Feature Learning on Remote Sensing Images in the Metric Space
arXiv
收藏 引用
arXiv 2023年
作者: Guo, Haonan Du, Bo Wu, Chen Han, Chengxi Zhang, Liangpei The State Key Laboratory of Information Engineering in Surveying Mapping and Remote Sensing Wuhan University Wuhan China The National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence School of Computer Science Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan China
Change detection (CD) is an important yet challenging task in the Earth observation field for monitoring Earth surface dynamics. The advent of deep learning techniques has recently propelled automatic CD into a techno... 详细信息
来源: 评论
Robust Synthetic-to-Real Transfer for Stereo Matching
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Jiawei Li, Jiahe Huang, Lei Yu, Xiaohan Gu, Lin Zheng, Jin Bai, Xiao School of Computer Science and Engineering State Key Laboratory of Complex & Critical Software Environment Jiangxi Research Institute Beihang University China SKLCCSE Institute of Artificial Intelligence Beihang University China School of Computing Macquarie University Australia RIKEN AIP Japan The University of Tokyo Japan
With advancements in domain generalized stereo matching networks, models pre-trained on synthetic data demonstrate strong robustness to unseen domains. However, few studies have investigated the robustness after fine-... 详细信息
来源: 评论
RADAP: A Robust and Adaptive Defense Against Diverse Adversarial Patches on Face Recognition
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Xiaoliang Shen, Furao Zhao, Jian Nie, Changhai State Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science and Technology Nanjing University China School of Artificial Intelligence Nanjing University China School of Electronic Science and Engineering Nanjing University China
Face recognition (FR) systems powered by deep learning have become widely used in various applications. However, they are vulnerable to adversarial attacks, especially those based on local adversarial patches that can... 详细信息
来源: 评论