咨询与建议

限定检索结果

文献类型

  • 278 篇 会议
  • 201 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 480 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 332 篇 工学
    • 254 篇 计算机科学与技术...
    • 207 篇 软件工程
    • 70 篇 信息与通信工程
    • 37 篇 控制科学与工程
    • 27 篇 生物工程
    • 24 篇 机械工程
    • 22 篇 光学工程
    • 18 篇 电子科学与技术(可...
    • 17 篇 仪器科学与技术
    • 16 篇 交通运输工程
    • 14 篇 电气工程
    • 12 篇 动力工程及工程热...
    • 12 篇 建筑学
    • 12 篇 生物医学工程(可授...
    • 10 篇 材料科学与工程(可...
    • 10 篇 安全科学与工程
    • 9 篇 土木工程
    • 8 篇 化学工程与技术
    • 6 篇 网络空间安全
  • 123 篇 理学
    • 71 篇 数学
    • 27 篇 生物学
    • 20 篇 统计学(可授理学、...
    • 19 篇 物理学
    • 15 篇 系统科学
    • 14 篇 化学
  • 81 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 39 篇 图书情报与档案管...
    • 17 篇 工商管理
  • 8 篇 法学
    • 5 篇 社会学
  • 8 篇 医学
    • 7 篇 临床医学
  • 4 篇 哲学
  • 4 篇 经济学
  • 3 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 14 篇 semantics
  • 10 篇 object detection
  • 10 篇 servers
  • 9 篇 feature extracti...
  • 9 篇 software
  • 9 篇 heuristic algori...
  • 7 篇 computational mo...
  • 7 篇 machine learning
  • 7 篇 computer vision
  • 7 篇 training
  • 6 篇 semantic segment...
  • 6 篇 deep learning
  • 6 篇 programming
  • 6 篇 safety
  • 6 篇 educational inst...
  • 6 篇 optimization
  • 6 篇 graph neural net...
  • 6 篇 resource allocat...
  • 6 篇 blockchain
  • 6 篇 satellites

机构

  • 178 篇 school of comput...
  • 156 篇 state key labora...
  • 109 篇 state key labora...
  • 47 篇 state key labora...
  • 23 篇 state key lab of...
  • 20 篇 institute of art...
  • 13 篇 zhongguancun lab...
  • 12 篇 beijing advanced...
  • 12 篇 hangzhou innovat...
  • 11 篇 school of comput...
  • 7 篇 state key labora...
  • 7 篇 sino-french engi...
  • 6 篇 school of mechan...
  • 5 篇 shen yuan honors...
  • 5 篇 school of artifi...
  • 5 篇 beihang universi...
  • 5 篇 beihang universi...
  • 5 篇 school of comput...
  • 5 篇 ping an technolo...
  • 5 篇 state key labora...

作者

  • 41 篇 xiao limin
  • 31 篇 huang di
  • 30 篇 ruan li
  • 29 篇 limin xiao
  • 20 篇 li ruan
  • 18 篇 zhang xiong
  • 17 篇 hao sheng
  • 14 篇 bai xiao
  • 14 篇 di huang
  • 11 篇 wang yunhong
  • 10 篇 li zhoujun
  • 10 篇 chen jiaxin
  • 10 篇 zhu mingfa
  • 9 篇 liu xianglong
  • 8 篇 wenge rong
  • 8 篇 yang hongyu
  • 8 篇 li yongnan
  • 8 篇 xu ke
  • 8 篇 luo jie
  • 7 篇 peng hao

语言

  • 400 篇 英文
  • 73 篇 其他
  • 9 篇 中文
检索条件"机构=State Key Lab.Of Software Development Environment School of Computer Science & Engineering"
480 条 记 录,以下是211-220 订阅
排序:
Use of LSTM Regression and Rotation Classification to Improve Camera Pose Localization Estimation
Use of LSTM Regression and Rotation Classification to Improv...
收藏 引用
IEEE International Workshop on Anti-counterfeiting, Security, Identification, ASID
作者: Meng Xu Lingfeng Wang Jian Ren Stefan Poslad State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing China School of Electrical Engineering and Computer Science Queen Mary University of London London U.K
More accurately estimating camera pose can be used to greatly improve localization in applications such as augmented reality, autonomous driving, and intelligent robots. Deep learning methods have achieved great progr... 详细信息
来源: 评论
EDOA: an efficient delay optimization approach for mixed-polarity Reed-Muller logic circuits under the unit delay model
收藏 引用
Frontiers of computer science 2019年 第5期13卷 1102-1115页
作者: Zhenxue HE Limin XIAO Fei GU Li RUAN Zhisheng HUO Mingzhe LI Mingfa ZHU Longbing ZHANG Rui LIU Xiang WANG College of Information Science and Technology Hebei Agricultural University Baoding 071001 China State Key Laboratory of Software Development Environment Beihang University Beijing 100083 China School of Computer Science and Engineering Beihang University Beijing 100083 China School of Electronic and Information Engineering Beihang University Beijing 100083 China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China National Engineering Research Center for Science & Technology Resources Sharing Service Beijing 100083 China
Delay optimization has recently attracted signif-icant attention. However, few studies have focused on the delay optimization of mixed-polarity Reed-Muller (MPRM) logic circuits. In this paper, we propose an efficient... 详细信息
来源: 评论
Topic Model Based Android Malware Detection  12th
Topic Model Based Android Malware Detection
收藏 引用
12th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage, SpaCCS 2019
作者: Song, Yucai Chen, Yang Lang, Bo Liu, Hongyu Chen, Shaojie State Key Lab of Software Development Environment School of Computer Science and Engineering Beihang University Beijing100191 China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing100191 China
Nowadays, the security risks brought by Android malwares are increasing. Machine learning is considered as a potential solution for promoting the performance of malware detection. For machine learning based Android ma... 详细信息
来源: 评论
A robust and generalized framework for adversarial graph embedding
arXiv
收藏 引用
arXiv 2021年
作者: Li, Jianxin Fu, Xingcheng Peng, Hao Wang, Senzhang Zhu, Shijie Sun, Qingyun Yu, Philip S. He, Lifang Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing100083 China State Key Laboratory of Software Development Environment Beihang University Beijing100083 China School of Computer Science and Engineering Central South University Changsha410083 China Department of Computer Science University of Illinois at Chicago ChicagoIL60607 United States Department of Computer Science and Engineering Lehigh University BethlehemPA18015 United States
Graph embedding is essential for graph mining tasks. With the prevalence of graph data in real-world applications, many methods have been proposed in recent years to learn high quality graph embedding vectors various ... 详细信息
来源: 评论
System architecture for high-performance permissioned blockchains
收藏 引用
Frontiers of computer science 2019年 第6期13卷 1151-1165页
作者: Libo FENG Hui ZHANG Wei-Tek TSAI Simeng SUN State Key Laboratory of Software Development Environment Beihang UniversityBeijing 100191China Digital Society&Blockchain Laboratory School of Computer ScienceBeihang UniversityBeijing 100191China Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang UniversityBeijing 100191China School of Computing Informatics and Decision Systems EngineeringArizona State UniversityTempeUSA
Blockchain(BC),as an emerging distributed database technology with advanced security and reliability,has attracted much attention from experts who devoted to efinance,intellectual property protection,the internet of t... 详细信息
来源: 评论
A General Recurrent Tracking Framework without Real Data
A General Recurrent Tracking Framework without Real Data
收藏 引用
International Conference on computer Vision (ICCV)
作者: Shuai Wang Hao Sheng Yang Zhang Yubin Wu Zhang Xiong State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing P.R.China Beihang Hangzhou Innovation Institute Yuhang Beihang University Xixi Octagon City Hangzhou P.R.China College of Information Science & Technology Beijing University of Chemical Technology Beijing P.R.China
Recent progress in multi-object tracking (MOT) has shown great significance of a robust scoring mechanism for potential tracks. However, the lack of available data in MOT makes it difficult to learn a general scoring ... 详细信息
来源: 评论
Unbiased scene graph generation via rich and fair semantic extraction
arXiv
收藏 引用
arXiv 2020年
作者: Wen, Bin Luo, Jie Liu, Xianglong Huang, Lei State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University No. 37 Xueyuan Road Beijing100191 China Abu Dhabi United Arab Emirates
Extracting graph representation of visual scenes in image is a challenging task in computer vision. Although there has been encouraging progress of scene graph generation in the past decade, we surprisingly find that ... 详细信息
来源: 评论
All Your PLCs Belong to Me: ICS Ransomware Is Realistic
All Your PLCs Belong to Me: ICS Ransomware Is Realistic
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Yipeng Zhang Zhonghao Sun Liqun Yang Zhoujun Li Qiang Zeng Yueying He Xiaoming Zhang State Key Lab of Software Development Environment Beihang University Beijing China CNCERT/CC Beijing China Department of Computer Science and Engineering University of South Carolina City United States
Ransomware is a new business model for cybercrime which mainly targets individual users and machines. Many events have shown how profitable the technique can be. Industrial control systems (ICS) are becoming the next ... 详细信息
来源: 评论
Spatiotemporal Attacks for Embodied Agents  1
收藏 引用
16th European Conference on computer Vision, ECCV 2020
作者: Liu, Aishan Huang, Tairan Liu, Xianglong Xu, Yitao Ma, Yuqing Chen, Xinyun Maybank, Stephen J. Tao, Dacheng State Key Laboratory of Software Development Environment Beihang University Beijing China Beijing Advanced Innovation Center for Big Data-Based Precision Medicine Beihang University Beijing China UC Berkeley London United States Birkbeck University of London London United Kingdom UBTECH Sydney AI Centre School of Computer Science Faculty of Engineering The University of Sydney Sydney Australia
Adversarial attacks are valuable for providing insights into the blind-spots of deep learning models and help improve their robustness. Existing work on adversarial attacks have mainly focused on static scenes;however... 详细信息
来源: 评论
A comparative study of large-scale cluster workload traces via multiview analysis  21
A comparative study of large-scale cluster workload traces v...
收藏 引用
21st IEEE International Conference on High Performance Computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on Data science and Systems, HPCC/SmartCity/DSS 2019
作者: Ruan, Li Xu, Xiangrong Xiao, Limin Yuan, Feng Li, Yin Dai, Dong State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing China Institute of Software Application Technology Guangzhou AND Chinese Academy of Sciences Guangzhou China Department of Computer Science University of North Carolina Charlotte CharlotteNC United States
Understanding the characteristics of workloads of the large-scale Clusters is the key to diagnose the system bottlenecks, making optimal configuration decisions, improving the system throughput and resource usage. Due... 详细信息
来源: 评论