咨询与建议

限定检索结果

文献类型

  • 2,169 篇 会议
  • 1,777 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 3,960 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,790 篇 工学
    • 2,079 篇 计算机科学与技术...
    • 1,725 篇 软件工程
    • 524 篇 信息与通信工程
    • 339 篇 控制科学与工程
    • 242 篇 生物工程
    • 215 篇 电子科学与技术(可...
    • 210 篇 电气工程
    • 174 篇 机械工程
    • 163 篇 光学工程
    • 129 篇 生物医学工程(可授...
    • 110 篇 仪器科学与技术
    • 109 篇 化学工程与技术
    • 100 篇 材料科学与工程(可...
    • 96 篇 动力工程及工程热...
    • 79 篇 网络空间安全
    • 74 篇 建筑学
    • 69 篇 交通运输工程
    • 67 篇 土木工程
  • 1,285 篇 理学
    • 772 篇 数学
    • 272 篇 生物学
    • 246 篇 物理学
    • 203 篇 统计学(可授理学、...
    • 131 篇 系统科学
    • 120 篇 化学
  • 761 篇 管理学
    • 456 篇 管理科学与工程(可...
    • 348 篇 图书情报与档案管...
    • 157 篇 工商管理
  • 103 篇 医学
    • 91 篇 临床医学
    • 74 篇 基础医学(可授医学...
  • 84 篇 法学
    • 63 篇 社会学
  • 57 篇 经济学
  • 38 篇 农学
  • 22 篇 教育学
  • 11 篇 艺术学
  • 9 篇 军事学
  • 8 篇 文学
  • 6 篇 哲学

主题

  • 102 篇 semantics
  • 69 篇 software enginee...
  • 67 篇 computer science
  • 66 篇 training
  • 63 篇 computational mo...
  • 58 篇 data mining
  • 57 篇 deep learning
  • 54 篇 web services
  • 50 篇 optimization
  • 49 篇 educational inst...
  • 49 篇 feature extracti...
  • 46 篇 algorithm design...
  • 45 篇 machine learning
  • 45 篇 clustering algor...
  • 45 篇 software
  • 40 篇 laboratories
  • 40 篇 cloud computing
  • 40 篇 data models
  • 38 篇 accuracy
  • 37 篇 quality of servi...

机构

  • 297 篇 state key labora...
  • 216 篇 school of comput...
  • 200 篇 state key labora...
  • 150 篇 state key labora...
  • 106 篇 state key labora...
  • 89 篇 state key labora...
  • 86 篇 school of comput...
  • 85 篇 state key lab. o...
  • 74 篇 state key lab of...
  • 71 篇 school of comput...
  • 69 篇 computer school ...
  • 65 篇 state key lab. f...
  • 57 篇 university of ch...
  • 52 篇 school of comput...
  • 49 篇 state key labora...
  • 46 篇 state key labora...
  • 45 篇 school of comput...
  • 43 篇 state key labora...
  • 41 篇 department of co...
  • 40 篇 international sc...

作者

  • 41 篇 huang di
  • 41 篇 xiao limin
  • 35 篇 gao yang
  • 35 篇 shi yinghuan
  • 32 篇 liu jin
  • 31 篇 limin xiao
  • 30 篇 ruan li
  • 26 篇 dou wanchun
  • 23 篇 bai xiao
  • 22 篇 zhao jian
  • 22 篇 tao dacheng
  • 21 篇 shen furao
  • 21 篇 he keqing
  • 21 篇 xu xiaolong
  • 21 篇 qi lei
  • 20 篇 qi lianyong
  • 20 篇 li bing
  • 20 篇 he yanxiang
  • 20 篇 li yuanxiang
  • 20 篇 du bo

语言

  • 3,656 篇 英文
  • 199 篇 其他
  • 105 篇 中文
  • 1 篇 法文
检索条件"机构=State Key Lab of Software Engineering and School of Computer"
3960 条 记 录,以下是821-830 订阅
排序:
Attribute-Specific Manipulation Based on Layer-Wise Channels
arXiv
收藏 引用
arXiv 2023年
作者: Yan, Yuanjie Zhao, Jian Shen, Furao State Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science and Technology Nanjing University China School of Electronic Science and Engineering Nanjing University Nanjing China School of Artificial Intelligence Nanjing University Nanjing China
Image manipulation on the latent space of the pre-trained StyleGAN can control the semantic attributes of the generated images. Recently, some studies have focused on detecting channels with specific properties to dir... 详细信息
来源: 评论
DLUE: Benchmarking Document Language Understanding
arXiv
收藏 引用
arXiv 2023年
作者: Xu, Ruoxi Lin, Hongyu Guan, Xinyan Han, Xianpei Sun, Yingfei Sun, Le Chinese Information Processing Laboratory Institute of Software Chinese Academy of Sciences Beijing China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China School of Electronic Electrical and Communication Engineering University of Chinese Academy of Sciences Beijing China
Understanding documents is central to many real-world tasks but remains a challenging topic. Unfortunately, there is no well-established consensus on how to comprehensively evaluate document understanding abilities, w... 详细信息
来源: 评论
Breaking Barriers in Physical-World Adversarial Examples: Improving Robustness and Transferability via Robust Feature  39
Breaking Barriers in Physical-World Adversarial Examples: Im...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Wang, Yichen Chou, Yuxuan Zhou, Ziqi Zhang, Hangtao Wan, Wei Hu, Shengshan Li, Minghui National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China
As deep neural networks (DNNs) are widely applied in the physical world, many researches are focusing on physical-world adversarial examples (PAEs), which introduce perturbations to inputs and cause the model's in... 详细信息
来源: 评论
Flat U-Net: An Efficient Ultralightweight Model for Solar Filament Segmentation in Full-disk Hα Images
arXiv
收藏 引用
arXiv 2025年
作者: Zhu, GaoFei Lin, GangHua Yang, Xiao Zeng, Cheng School of Computer and Software Engineering Xihua University Chengdu610039 China National Astronomical Observatories Chinese Academy of Sciences Beijing100101 China State Key Laboratory of Solar Activity and Space Weather National Space Science Center Chinese Academy of Sciences Beijing100190 China
Solar filaments are one of the most prominent features observed on the Sun, and their evolutions are closely related to various solar activities, such as flares and coronal mass ejections. Real-time automated identifi... 详细信息
来源: 评论
Accelerating MUS enumeration by inconsistency graph partitioning
收藏 引用
Science China(Information Sciences) 2019年 第11期62卷 70-80页
作者: Jie LUO Shaofan LIU State Key Laboratory of Software Development Environment School of Computer Science and EngineeringBeihang University
The problem of finding minimal unsatisfiable subsets(MUSes) has been studied frequently because of its theoretical importance and wide range of applications in domains such as electronic design automation, software, a... 详细信息
来源: 评论
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
Detecting Backdoors During the Inference Stage Based on Corr...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Xiaogeng Liu Minghui Li Haoyu Wang Shengshan Hu Dengpan Ye Hai Jin Libing Wu Chaowei Xiao School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Software Engineering Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan University School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab Arizona State University
Deep neural networks are proven to be vulnerable to backdoor attacks. Detecting the trigger samples during the inference stage, i.e., the test-time trigger sample detection, can prevent the backdoor from being trigger...
来源: 评论
Breaking Barriers in Physical-World Adversarial Examples: Improving Robustness and Transferability via Robust Feature
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Yichen Chou, Yuxuan Zhou, Ziqi Zhang, Hangtao Wan, Wei Hu, Shengshan Li, Minghui National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of School of Software Engineering Huazhong University of Science and Technology China
As deep neural networks (DNNs) are widely applied in the physical world, many researches are focusing on physical-world adversarial examples (PAEs), which introduce perturbations to inputs and cause the model’s incor... 详细信息
来源: 评论
Learning Fair and Efficient Multiple Access Schemes with Decomposed MADDPG
Learning Fair and Efficient Multiple Access Schemes with Dec...
收藏 引用
Future Communications and Networks (FCN), International Conference on
作者: Zhaoyang Liu Haoxin Lin Xijun Wang Jie Gong Xiang Chen School of Electronics and Information Technology Sun Yat-sen University Guangzhou China Guangxi Key Laboratory of Wireless Wideband Communication and Signal Processing Guilin China State Key Lab of Novel Software Technology Nanjing University Nanjing China Guangdong Key Laboratory of Information Security Technology School of Computer Science and Engineering Sun Yat-sen University Guangzhou China
With the growing demand for wireless communication networks, achieving efficient and equitable channel access schemes has become paramount. In this paper, we delve into the realm of distributed channel access in homog... 详细信息
来源: 评论
基于边缘计算的软件定义云制造和柔性资源调度研究
收藏 引用
engineering 2023年 第3期22卷 60-70页
作者: 杨晨 廖方茵 兰舒琳 王力翚 沈卫明 黄国全 School of Cyberspace Science and Technology Beijing Institute of TechnologyBeijing 100081China School of Computer Science and Technology Beijing Institute of TechnologyBeijing 100081China School of Mathematics and Computer Science Yan'an UniversityYan'an 716000China School of Economics and Management University of Chinese Academy of SciencesBeijing 100190China Department of Production Engineering KTH Royal Institute of TechnologyStockholm 10044Sweden State Key Lab of Digital Manufacturing Equipment and Technology Huazhong University of Science and TechnologyWuhan 430074China Department of Industrial and Manufacturing Systems Engineering The University of Hong KongHong Kong 999077China
本研究的重点是在云制造环境中实现快速重构、实现灵活的资源调度、开发资源潜力以应对各种变化。因此,本文首先提出了一种新的基于云和软件定义网络(SDN)的制造模型——软件定义云制造(SDCM),该模型将控制逻辑从自动化硬件转移到软件... 详细信息
来源: 评论
Research on key Word Information Retrieval Based on Inverted Index  8th
Research on Key Word Information Retrieval Based on Inverted...
收藏 引用
8th International Conference on Artificial Intelligence and Security , ICAIS 2022
作者: Qi, Meihan Fang, Wei Zhao, Yongming Sha, Yu Sheng, Victor S. School of Computer and Software Engineering Research Center of Digital Forensics Ministry of Education Nanjing University of Information Science and Technology Nanjing210044 China State Key Laboratory of Severe Weather Chinese Academy of Meteorological Sciences Beijing100081 China China Meteorological Administration Training Center Beijing China Department of Computer Texas Tech University LubbockTX79409 United States
With the advent of the era of big data, data has penetrated into every aspect of social life and become an important production factor in various industries. However, while providing convenience to our life, massive i... 详细信息
来源: 评论