咨询与建议

限定检索结果

文献类型

  • 348 篇 期刊文献
  • 195 篇 会议
  • 1 册 图书

馆藏范围

  • 544 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 387 篇 工学
    • 269 篇 计算机科学与技术...
    • 230 篇 软件工程
    • 83 篇 信息与通信工程
    • 55 篇 生物工程
    • 40 篇 电气工程
    • 36 篇 控制科学与工程
    • 34 篇 电子科学与技术(可...
    • 33 篇 光学工程
    • 28 篇 生物医学工程(可授...
    • 25 篇 机械工程
    • 17 篇 化学工程与技术
    • 14 篇 仪器科学与技术
    • 14 篇 核科学与技术
    • 13 篇 网络空间安全
    • 12 篇 材料科学与工程(可...
    • 9 篇 动力工程及工程热...
    • 9 篇 安全科学与工程
  • 204 篇 理学
    • 86 篇 数学
    • 71 篇 物理学
    • 58 篇 生物学
    • 20 篇 统计学(可授理学、...
    • 17 篇 化学
    • 15 篇 系统科学
  • 107 篇 管理学
    • 67 篇 管理科学与工程(可...
    • 46 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 25 篇 医学
    • 20 篇 临床医学
    • 16 篇 基础医学(可授医学...
    • 10 篇 药学(可授医学、理...
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 8 篇 法学
  • 5 篇 教育学
  • 3 篇 农学
  • 2 篇 军事学
  • 2 篇 艺术学
  • 1 篇 文学

主题

  • 15 篇 semantics
  • 10 篇 hadron-hadron sc...
  • 9 篇 deep learning
  • 9 篇 feature extracti...
  • 9 篇 computer vision
  • 9 篇 robustness
  • 8 篇 machine learning
  • 7 篇 object detection
  • 7 篇 optimization
  • 7 篇 students
  • 6 篇 federated learni...
  • 5 篇 interpolation
  • 5 篇 accuracy
  • 5 篇 forecasting
  • 5 篇 data models
  • 4 篇 complex networks
  • 4 篇 semantic segment...
  • 4 篇 distillation
  • 4 篇 computers
  • 4 篇 change detection

机构

  • 49 篇 hubei key labora...
  • 38 篇 national enginee...
  • 25 篇 centro brasileir...
  • 25 篇 istanbul technic...
  • 25 篇 yerevan physics ...
  • 25 篇 department of ph...
  • 24 篇 national and kap...
  • 24 篇 charles universi...
  • 23 篇 universidad iber...
  • 23 篇 brunel universit...
  • 23 篇 university of sp...
  • 23 篇 academy of scien...
  • 23 篇 indian institute...
  • 23 篇 zhejiang univers...
  • 23 篇 school of comput...
  • 22 篇 italian national...
  • 22 篇 konya technical ...
  • 22 篇 università di to...
  • 22 篇 bingol universit...
  • 22 篇 erciyes universi...

作者

  • 70 篇 du bo
  • 35 篇 tao dacheng
  • 23 篇 liu juhua
  • 21 篇 konstantinou s.
  • 20 篇 lethuillier m.
  • 20 篇 pauls a.
  • 20 篇 lehti s.
  • 20 篇 waltenberger w.
  • 20 篇 lowette s.
  • 20 篇 luukka p.
  • 18 篇 ruimin hu
  • 17 篇 tavernier s.
  • 17 篇 hu ruimin
  • 16 篇 ding liang
  • 15 篇 zhong qihuang
  • 15 篇 wang zheng
  • 14 篇 mastrolorenzo l.
  • 14 篇 bo du
  • 13 篇 chen g.m.
  • 13 篇 laktineh i.b.

语言

  • 508 篇 英文
  • 25 篇 其他
  • 11 篇 中文
检索条件"机构=State Key Laboratory Software Engineering and School Computer and Complex Network Research Center"
544 条 记 录,以下是181-190 订阅
排序:
Multi-granularity dynamic analysis of complex software networks
Multi-granularity dynamic analysis of complex software netwo...
收藏 引用
IEEE International Symposium on Circuits and Systems (ISCAS)
作者: Bing Li Weifeng Pan Jinhu Lü State Key Laboratory Software Engineering and School Computer and Complex Network Research Center Wuhan University of China Wuhan China State Key Laboratory Software Engineering Wuhan University of China Wuhan China School Electrical Computer Engineering RMIT University Melbourne Australia Acad. Mathematics System Science Chinese Academy and Sciences Beijing China
software systems represent one of the most complex man-made systems. In this paper, we analyze the evolution of Object-Oriented (OO) software using complex network theory from a multi-granularity perspective. First, t... 详细信息
来源: 评论
Conformal mesh parameterization using discrete Calabi flow
收藏 引用
computer AIDED GEOMETRIC DESIGN 2018年 63卷 96-108页
作者: Zhao, Hui Li, Xuan Ge, Huabin Lei, Na Zhang, Min Wang, Xiaoling Gu, Xianfeng [a]Tsinghua University China [b]Beijing Advanced Innovation Center for Imaging Technology Capital Normal University China [c]Department of Mathematics Beijing Jiaotong University China [d]DUT-RU International School of Information and Software Engineering Dalian University of Technology China [e]Computer Science Department State University of New York at Stony Brook USA [f]Brigham and Women's Hospital Harvard Medical School USA [g]Center of Mathematical Sciences and Applications Harvard University USA [h]Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province China [i]School of Mechanical Engineering University of Science and Technology Beijing China
In this paper, we introduce discrete Calabi flow to the graphics research community and present a novel conformal mesh parameterization algorithm. Calabi energy has a succinct and explicit format. Its corresponding fl... 详细信息
来源: 评论
Imperceptible and Reliable Adversarial Attack  1
收藏 引用
4th International Conference on Frontiers in Cyber Security, FCS 2021
作者: Zhang, Jiawei Wang, Jinwei Luo, Xiangyang Ma, Bin Xiong, Naixue School of Computer and Software Engineering Research Center of Digital Forensics Ministry of Education Nanjing University of Information Science and Technology Nanjing210044 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhenzhou450001 China Shandong Provincial Key Laboratory of Computer Networks and Qilu University of Technology Jinan250353 China Department of Computer Science and Mathematics Sul Ross State University AlpineTX79830 United States
Deep neural networks are vulnerable to adversarial examples, which can fool classifiers by adding small perturbations. Various adversarial attack methods have been proposed in the past several years, and most of them ... 详细信息
来源: 评论
Self-Supervised Teaching and Learning of Representations on Graphs  23
Self-Supervised Teaching and Learning of Representations on ...
收藏 引用
2023 World Wide Web Conference, WWW 2023
作者: Wan, Liangtian Fu, Zhenqiang Sun, Lu Wang, Xianpeng Xu, Gang Yan, Xiaoran Xia, Feng Key Laboratory for Ubiquitous Network Service Software of Liaoning Province School of Software Dalian University of Technology Dalian China Department of Communication Engineering Institute of Information Science Technology Dalian Maritime University Dalian China State Key Laboratory of Marine Resource Utilization in South China Sea School of Information and Communication Engineering Hainan University Haikou China State Key Laboratory of Millimeter Waves School of Information Science and Engineering Southeast University Nanjing China Research Center of Big Data Intelligence Research Institute of Artificial Intelligence Zhejiang Lab Hangzhou China School of Computing Technologies Rmit University Melbourne Australia
Recent years have witnessed significant advances in graph contrastive learning (GCL), while most GCL models use graph neural networks as encoders based on supervised learning. In this work, we propose a novel graph le... 详细信息
来源: 评论
Accountable authority identity-based encryption with public traceability
Accountable authority identity-based encryption with public ...
收藏 引用
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013
作者: Lai, Junzuo Deng, Robert H. Zhao, Yunlei Weng, Jian School of Information Systems Singapore Management University Singapore Singapore Software School Fudan University China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences China Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University China Shanghai Key Laboratory of Integrate Administration Technologies for Information Security China
At Crypto'07, Goyal introduced the notion of accountable authority identity-based encryption (A-IBE) in order to mitigate the inherent key escrow problem in identity-based encryption, and proposed two concrete con... 详细信息
来源: 评论
An Experimental Study of Unsupervised Rank Aggregation Methods in World University Rankings
An Experimental Study of Unsupervised Rank Aggregation Metho...
收藏 引用
Intelligent Education and Intelligent research (IEIR), International Conference on
作者: Shiwei Feng Qi Deng Siyi Wang Lin Song Chao Liang Hubei Key Laboratory of Multimedia and Network Communication Engineering National Engineering Research Center for Multimedia Software (NERCMS) School of Computer Science Wuhan University
Recently, more and more college ranking systems are receiving attention due to the demand and necessity of higher education and college ranking system is a key topic in the field of social choice. However, these ranki...
来源: 评论
Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks
Efficient public key cryptosystem resilient to key leakage c...
收藏 引用
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013
作者: Liu, Shengli Weng, Jian Zhao, Yunlei Dept. of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University China Software School Fudan University Shanghai 201203 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai China
Leakage-resilient public key encryption (PKE) schemes are designed to resist "memory attacks", i.e., the adversary recovers the cryptographic key in the memory adaptively, but subject to constraint that the ... 详细信息
来源: 评论
NNVISR: Bring Neural network Video Interpolation and Super Resolution into Video Processing Framework
arXiv
收藏 引用
arXiv 2023年
作者: Tong, Yuan Hu, Mengshun Wang, Zheng National Engineering Research Center for Multimedia Software Hubei Key Laboratory of Multimedia and Network Communication Engineering School of Computer Science Wuhan University China
We present NNVISR - an open-source filter plugin for the VapourSynth1 video processing framework, which facilitates the application of neural networks for various kinds of video enhancing tasks, including denoising, s... 详细信息
来源: 评论
whu-nercms at trecvid2021:instance search task
arXiv
收藏 引用
arXiv 2021年
作者: Niu, Yanrui Yang, Jingyao Lu, Ankang Huang, Baojin Zhang, Yue Huang, Ji Wen, Shishi Xu, Dongshu Liang, Chao Wang, Zhongyuan Chen, Jun Hubei Key Laboratory of Multimedia and Network Communication Engineering National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University China
We will make a brief introduction of the experimental methods and results of the WHU-NERCMS in the TRECVID2021 in the paper. This year we participate in the automatic and interactive tasks of Instance Search (INS). Fo... 详细信息
来源: 评论
Who, What and Where: Composite-semantic Instance Search for Story Videos
Who, What and Where: Composite-semantic Instance Search for ...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Jiahao Guo Chao Liang Zhongyuan Wang National Engineering Research Center for Multimedia Software (NERCMS) Hubei Key Laboratory of Multimedia and Network Communication Engineering School of Computer Science Wuhan University
This paper studies Who-What-Where (3W) composite-semantic video instance search (INS) problem, which aims to find a specific person doing a queried action in a particular place. Mainstream approaches adopt a complete ...
来源: 评论