咨询与建议

限定检索结果

文献类型

  • 6,333 篇 会议
  • 4,558 篇 期刊文献
  • 15 册 图书

馆藏范围

  • 10,906 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,439 篇 工学
    • 5,600 篇 计算机科学与技术...
    • 4,597 篇 软件工程
    • 1,382 篇 信息与通信工程
    • 966 篇 控制科学与工程
    • 674 篇 电气工程
    • 667 篇 生物工程
    • 569 篇 电子科学与技术(可...
    • 557 篇 机械工程
    • 425 篇 光学工程
    • 331 篇 生物医学工程(可授...
    • 301 篇 化学工程与技术
    • 274 篇 仪器科学与技术
    • 219 篇 网络空间安全
    • 203 篇 动力工程及工程热...
    • 190 篇 建筑学
    • 180 篇 土木工程
    • 178 篇 安全科学与工程
    • 174 篇 交通运输工程
    • 170 篇 材料科学与工程(可...
  • 3,530 篇 理学
    • 2,143 篇 数学
    • 754 篇 物理学
    • 738 篇 生物学
    • 600 篇 统计学(可授理学、...
    • 400 篇 系统科学
    • 311 篇 化学
  • 2,097 篇 管理学
    • 1,236 篇 管理科学与工程(可...
    • 927 篇 图书情报与档案管...
    • 399 篇 工商管理
  • 259 篇 法学
    • 191 篇 社会学
  • 239 篇 医学
    • 198 篇 临床医学
  • 143 篇 经济学
  • 94 篇 教育学
  • 93 篇 农学
  • 37 篇 艺术学
  • 34 篇 文学
  • 27 篇 军事学
  • 2 篇 哲学

主题

  • 295 篇 semantics
  • 255 篇 computer science
  • 223 篇 laboratories
  • 213 篇 feature extracti...
  • 190 篇 computational mo...
  • 173 篇 deep learning
  • 157 篇 optimization
  • 143 篇 data mining
  • 135 篇 training
  • 133 篇 wireless sensor ...
  • 130 篇 software enginee...
  • 129 篇 software
  • 115 篇 algorithm design...
  • 114 篇 image segmentati...
  • 109 篇 accuracy
  • 106 篇 neural networks
  • 105 篇 educational inst...
  • 105 篇 machine learning
  • 104 篇 task analysis
  • 99 篇 predictive model...

机构

  • 1,840 篇 state key labora...
  • 243 篇 national key lab...
  • 210 篇 department of co...
  • 203 篇 university of ch...
  • 175 篇 department of co...
  • 175 篇 state key labora...
  • 132 篇 tianjin key labo...
  • 123 篇 nanjing universi...
  • 110 篇 state key labora...
  • 107 篇 state key labora...
  • 95 篇 school of comput...
  • 93 篇 state key labora...
  • 91 篇 college of compu...
  • 90 篇 school of comput...
  • 88 篇 beijing key labo...
  • 88 篇 college of compu...
  • 88 篇 school of inform...
  • 84 篇 key laboratory o...
  • 79 篇 college of compu...
  • 77 篇 state key labora...

作者

  • 93 篇 gao yang
  • 52 篇 liu yang
  • 49 篇 baowen xu
  • 48 篇 wu gangshan
  • 48 篇 guihai chen
  • 47 篇 zhou zhi-hua
  • 45 篇 junping du
  • 43 篇 sanglu lu
  • 41 篇 limin wang
  • 41 篇 shen furao
  • 41 篇 yin baocai
  • 39 篇 lu sanglu
  • 36 篇 zhang hua
  • 36 篇 zhao jian
  • 34 篇 baocai yin
  • 34 篇 zhang yan
  • 34 篇 shi yinghuan
  • 33 篇 wang wei
  • 31 篇 wanchun dou
  • 30 篇 yang yang

语言

  • 9,141 篇 英文
  • 1,465 篇 其他
  • 319 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novel Software Technology Computer Science and Technology"
10906 条 记 录,以下是4861-4870 订阅
排序:
Sample hardness based gradient loss for long-tailed cervical cell detection
arXiv
收藏 引用
arXiv 2022年
作者: Liu, Minmin Li, Xuechen Gao, Xiangbo Chen, Junliang Shen, Linlin Wu, Huisi Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University China Shenzhen Institute of Artificial Intelligence of Robotics of Society Shenzhen China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen518060 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China University of California Irvine United States
Due to the difficulty of cancer samples collection and annotation, cervical cancer datasets usually exhibit a long-tailed data distribution. When training a detector to detect the cancer cells in a WSI (Whole Slice Im... 详细信息
来源: 评论
Transformers in Medical Image Analysis: A Review
arXiv
收藏 引用
arXiv 2022年
作者: He, Kelei Gan, Chen Li, Zhuoyuan Rekik, Islem Yin, Zihao Ji, Wen Gao, Yang Wang, Qian Zhang, Junfeng Shen, Dinggang Medical School of Nanjing University Nanjing China National Institute of Healthcare Data Science Nanjing University Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China BASIRA Lab Faculty of Computer and Informatics Engineering Istanbul Technical University Istanbul Turkey School of Science and Engineering Computing University of Dundee United Kingdom School of Biomedical Engineering ShanghaiTech University Shanghai China Department of Research and Development Shanghai United Imaging Intelligence Co. Ltd. Shanghai China
Transformers have dominated the field of natural language processing, and recently impacted the computer vision area. In the field of medical image analysis, Transformers have also been successfully applied to full-st... 详细信息
来源: 评论
GK: A Graphormer Architecture Based Knowledge Graph Reasoning Model for Link Prediction
GK: A Graphormer Architecture Based Knowledge Graph Reasonin...
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Yueiia Wu Jian-tao Zhou Ministry of Education Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Inner Mongolia Key Laboratory of Social Computing and Data Processing College of Computer Science Inner Mongolia University National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian Engineering Research Center of Ecological Big Data Hohhot China
Knowledge Graph has become a dominant research field in graph theory, but its incompleteness and sparsity hinder its application in various fields. Knowledge Graph Reasoning aims to alleviate these problems by deducin... 详细信息
来源: 评论
Multi-Level Chaotic Maps for 3D Textured Model Encryption  2nd
Multi-Level Chaotic Maps for 3D Textured Model Encryption
收藏 引用
2nd EAI International Conference on Robotic Sensor Networks, ROSENET 2018
作者: Jin, Xin Zhu, Shuyun Wu, Le Zhao, Geng Li, Xiaodong Zhou, Quan Lu, Huimin Department of Cyber Security Beijing Electronic Science and Technology Institute Beijing China CETC Big Data Research Institute Co. Ltd. Guizhou Guiyang China Department of Cyber Security Beijing Electronic Science and Technology Institute Beijing China National Engineering Research Center of Communications and Networking Nanjing University of Posts and Telecommunications Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Mechanical and Control Engineering Kyushu Institute of Technology Kitakyushu Japan
With the rapid progress of virtual reality and augmented reality technologies, 3D contents are the next widespread media in many applications. Thus, the protection of 3D models is primarily important. Encryption of 3D... 详细信息
来源: 评论
Verifiable Privacy Preservation Scheme for Outsourcing Medi-cal Image to Cloud Through ROI Based Crypto-Watermarking
Verifiable Privacy Preservation Scheme for Outsourcing Medi-...
收藏 引用
IEEE/ACM Int'l Conference on & Int'l Conference on Cyber, Physical and Social Computing (CPSCom) Green Computing and Communications (GreenCom)
作者: Chuan Zhou Yi Zhou XingHan An Yan Liu Min Wang XiangZhi Liu Tianjin University Tianjin China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China College of Environmental Science and Engineering Beijing Forestry University Beijing China Inspur Software Co. Ltd. Jinan China The Party School of cpc Jinan Municipal Committee Jinan China
A novel verifiable privacy preservation scheme for outsourcing medical image to cloud through ROI based crypto-watermarking is proposed in the paper. In the proposed scheme, data owner firstly carries out substitution...
来源: 评论
A Distributed Approximation Algorithm for the Total Dominating Set Problem
SSRN
收藏 引用
SSRN 2022年
作者: Wang, Limin Zhang, Zhao Du, Donglei Mao, Yaping Zhang, Xiaoyan State Key Laboratory for Novel Software Technology Nanjing University Jiangsu210023 China College of Mathematics and Computer Sciences Zhejiang Normal University Zhejiang321004 China Faculty of Management University of New Brunswick FrederictonNBE3B 5A3 Canada School of Mathematics and Statistics Qinghai Normal University Qinghai810008 China Academy of Plateau Science and Sustainability Qinghai Xining810008 China School of Mathematical Science Institute of Mathematics Nanjing Normal University Jiangsu210023 China
Given a network graph $G=(V,E)$, a subset $T\subseteq V$ is said to be a total dominating set (TDS) if every $v\in V$ is adjacent to at least one node in $T$. In this paper, we present a distributed algorithm for the ... 详细信息
来源: 评论
Test-Time Domain Adaptation by Learning Domain-Aware Batch Normalization
arXiv
收藏 引用
arXiv 2023年
作者: Wu, Yanan Chi, Zhixiang Wang, Yang Plataniotis, Konstantinos N. Feng, Songhe Key Laboratory of Big Data & Artificial Intelligence in Transportation Ministry of Education Beijing Jiaotong University Beijing100044 China School of Computer and Information Technology Beijing Jiaotong University Beijing100044 China The Edward S Rogers Sr. ECE Department University of Toronto TorontoM5S3G8 Canada Department of Computer Science and Software Engineering Concordia University MontrealH3G2J1 Canada
Test-time domain adaptation aims to adapt the model trained on source domains to unseen target domains using a few unlabeled images. Emerging research has shown that the label and domain information is separately embe... 详细信息
来源: 评论
Intermediate Value Size Aware Coded MapReduce
Intermediate Value Size Aware Coded MapReduce
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Yamei Dong Bin Tang Baoliu Ye Zhihao Qu Sanglu Lu National Key Laboratory for Novel Software Technology Nanjing University Nanjing China School of Computer and Information Hohai University Nanjing China
MapReduce is a commonly used framework for parallel processing of data-intensive tasks, but its performance usually suffers from heavy communication load incurred by the shuffling of intermediate values (IVs) among co... 详细信息
来源: 评论
CSPs: Catchy short passwords making offline and online attacks impossible
收藏 引用
International Journal of Information and computer Security 2019年 第3期11卷 255-274页
作者: Shen, Jaryn Zeng, Qingkai State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing210023 China
This paper proposes to address online and offline attacks to passwords without increasing users' efforts in choosing and memorising their passwords. In CSPS, a password consists of two parts, a user-chosen short p... 详细信息
来源: 评论
TrustCross: Enabling confidential interoperability across blockchains using trusted hardware
arXiv
收藏 引用
arXiv 2021年
作者: Lan, Ying Gao, Jianbo Wang, Ke Zhang, Jiashuo Wu, Zhenhao Zhu, Yuesheng Chen, Zhong School of Electrical and Computer Engineering Peking University Shenzhen China Department of Computer Science and Technology EECS Peking University Beijing China Key Laboratory of High Confidence Software Technologies Peking University MoE Beijing China
With the rapid development of blockchain technology, different types of blockchains are adopted and interoperability across blockchains has received widespread attention. There have been many cross-chain solutions pro... 详细信息
来源: 评论