咨询与建议

限定检索结果

文献类型

  • 2,947 篇 会议
  • 2,510 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 5,471 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,817 篇 工学
    • 2,870 篇 计算机科学与技术...
    • 2,343 篇 软件工程
    • 707 篇 信息与通信工程
    • 517 篇 控制科学与工程
    • 329 篇 生物工程
    • 310 篇 电气工程
    • 279 篇 电子科学与技术(可...
    • 267 篇 机械工程
    • 220 篇 光学工程
    • 194 篇 生物医学工程(可授...
    • 151 篇 仪器科学与技术
    • 136 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 98 篇 网络空间安全
    • 89 篇 土木工程
    • 87 篇 建筑学
  • 1,827 篇 理学
    • 1,127 篇 数学
    • 391 篇 物理学
    • 373 篇 生物学
    • 307 篇 统计学(可授理学、...
    • 237 篇 系统科学
    • 139 篇 化学
  • 1,088 篇 管理学
    • 665 篇 管理科学与工程(可...
    • 456 篇 图书情报与档案管...
    • 219 篇 工商管理
  • 147 篇 医学
    • 124 篇 临床医学
    • 103 篇 基础医学(可授医学...
    • 76 篇 药学(可授医学、理...
  • 136 篇 法学
    • 100 篇 社会学
  • 77 篇 经济学
    • 77 篇 应用经济学
  • 54 篇 教育学
  • 47 篇 农学
  • 17 篇 文学
  • 15 篇 艺术学
  • 14 篇 军事学

主题

  • 179 篇 computer science
  • 135 篇 laboratories
  • 132 篇 semantics
  • 97 篇 feature extracti...
  • 94 篇 wireless sensor ...
  • 91 篇 optimization
  • 91 篇 training
  • 81 篇 data mining
  • 80 篇 computational mo...
  • 78 篇 deep learning
  • 76 篇 software
  • 70 篇 algorithm design...
  • 64 篇 software enginee...
  • 61 篇 clustering algor...
  • 61 篇 testing
  • 60 篇 cloud computing
  • 59 篇 accuracy
  • 58 篇 web services
  • 57 篇 software testing
  • 56 篇 application soft...

机构

  • 1,067 篇 state key labora...
  • 224 篇 department of co...
  • 223 篇 national key lab...
  • 176 篇 department of co...
  • 139 篇 school of inform...
  • 117 篇 state key labora...
  • 114 篇 state key labora...
  • 108 篇 state key labora...
  • 102 篇 college of compu...
  • 88 篇 university of ch...
  • 81 篇 school of comput...
  • 81 篇 shandong provinc...
  • 71 篇 shandong provinc...
  • 69 篇 department of co...
  • 59 篇 school of softwa...
  • 58 篇 school of artifi...
  • 57 篇 shanghai key lab...
  • 51 篇 state key labora...
  • 51 篇 state key labora...
  • 49 篇 state key labora...

作者

  • 68 篇 gao yang
  • 47 篇 shi yinghuan
  • 43 篇 dou wanchun
  • 42 篇 guihai chen
  • 38 篇 sanglu lu
  • 38 篇 li wu-jun
  • 37 篇 zhou zhi-hua
  • 32 篇 shen furao
  • 32 篇 baowen xu
  • 32 篇 junping du
  • 31 篇 yu huiqun
  • 30 篇 zhao jian
  • 30 篇 xu baowen
  • 30 篇 zhang lijun
  • 28 篇 lu sanglu
  • 28 篇 fan guisheng
  • 28 篇 liu hong
  • 26 篇 yang tianbao
  • 26 篇 xu xiaolong
  • 26 篇 xu chang

语言

  • 4,996 篇 英文
  • 321 篇 其他
  • 153 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novel Software Technology Department of Computer Science and Technology"
5471 条 记 录,以下是1141-1150 订阅
排序:
Roll With the Punches: Expansion and Shrinkage of Soft Label Selection for Semi-supervised Fine-Grained Learning
arXiv
收藏 引用
arXiv 2023年
作者: Duan, Yue Zhao, Zhen Qi, Lei Zhou, Luping Wang, Lei Shi, Yinghuan National Key Laboratory for Novel Software Technology Nanjing University China School of Electrical and Information Engineering The University of Sydney Sydney Australia School of Computer Science and Engineering Southeast University China School of Computing and Information Technology University of Wollongong Australia
While semi-supervised learning (SSL) has yielded promising results, the more realistic SSL scenario remains to be explored, in which the unlabeled data exhibits extremely high recognition difficulty, e.g., fine-graine... 详细信息
来源: 评论
Cprnc: Channels Pruning Via Reverse Neuron Crowding for Model Compression
SSRN
收藏 引用
SSRN 2023年
作者: Wu, Pingfan Huang, Hengyi Sun, Han Liang, Dong Liu, Ningzhong College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing211106 China MIIT Key Laboratory of Pattern Analysis and Machine Intelligence Nanjing211106 China Collaborative Innovation Center of Novel Software Technology and Industrialization Nanjing211106 China
Channel pruning is an efficient technique for model compression, removing redundant parts of a convolutional neural network with minor degradation in classification accuracy. Previous criteria of channel pruning ignor... 详细信息
来源: 评论
ROBUST CROSS-SCENE FOREGROUND SEGMENTATION IN SURVEILLANCE VIDEO
ROBUST CROSS-SCENE FOREGROUND SEGMENTATION IN SURVEILLANCE V...
收藏 引用
2021 IEEE International Conference on Multimedia and Expo, ICME 2021
作者: Liang, Dong Wei, Zongqi Sun, Han Zhou, Huiyu College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics MIIT Key Laboratory of Pattern Analysis and Machine Intelligence Collaborative Innovation Center of Novel Software Technology and Industrialization China School of Informatics University of Leicester United Kingdom
Training only one deep model for large-scale cross-scene video foreground segmentation is challenging due to the off-the-shelf deep learning based segmentor relies on scene-specific structural information. This result... 详细信息
来源: 评论
Generalizable Medical Image Segmentation via Random Amplitude Mixup and Domain-Specific Image Restoration
arXiv
收藏 引用
arXiv 2022年
作者: Zhou, Ziqi Qi, Lei Shi, Yinghuan State Key Laboratory for Novel Software Technology Nanjing University China National Institute of Healthcare Data Science Nanjing University China School of Computer Science and Engineering Southeast University China
For medical image analysis, segmentation models trained on one or several domains lack generalization ability to unseen domains due to discrepancies between different data acquisition policies. We argue that the degen... 详细信息
来源: 评论
Building Device Models Using LLMs for Requirements Simulation in Smart Homes
Building Device Models Using LLMs for Requirements Simulatio...
收藏 引用
IEEE International Requirements Engineering Conference Workshops (REW)
作者: Shi Chen Xiaohong Chen Zhi Jin Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai China Key Laboratory of High-Confidence Software Technologies Peking University Ministry of Education China Department of Computer Science and Technology Peking University Beijing China
The implementation of model-based requirements simulations in smart homes is an effective strategy that allows users to comprehend the execution impact of their personalized needs before deployment. This necessitates ... 详细信息
来源: 评论
AIAT: Adaptive Iteration Adversarial Training for Robust Pulmonary Nodule Detection
AIAT: Adaptive Iteration Adversarial Training for Robust Pul...
收藏 引用
2022 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2022
作者: Yang, Guoxing Liu, Xiaohong Shi, Jianyu Zhang, Xianchao Wang, Guangyu Beijing University of Posts and Telecommunications State Key Laboratory of Networking and Switching Technology Beijing100876 China Tsinghua University Department of Computer Science and Technology Beijing100084 China Jiaxing University Key Laboratory of Medical Electronics and Digital Health of Zhejiang Province Jiaxing314001 China Peng Cheng Laboratory Department of Mathematics and Theories Shenzhen518055 China
Lung cancer is one of the leading causes of death worldwide. Early diagnosis through cancer screening can significantly improve lung cancer patients' survival. Recently, deep learning based diagnostic systems for ... 详细信息
来源: 评论
Unsatisfiable Core Based Constraint Solving Cache in Symbolic Execution
Unsatisfiable Core Based Constraint Solving Cache in Symboli...
收藏 引用
Asia-Pacific Conference on software Engineering
作者: Ziqi Shuai Zhenbang Chen Yufeng Zhang Hengbiao Yu Ji Wang College of Computer National University of Defense Technology China Key Laboratory of Software Engineering for Complex Systems National University of Defense Technology China State Key Laboratory of High Performance Computing National University of Defense Technology China College of Computer Science and Electronic Engineering Hunan University Changsha China
Constraint solving stands out as a significant bot-tleneck in symbolic execution. Caching is a commonly adopted approach to alleviate this bottleneck. However, the cutting-edge caching technique targeting unsatisfiabl...
来源: 评论
UCPM: Uncertainty-Guided Cross-Modal Retrieval with Partially Mismatched Pairs
收藏 引用
IEEE Transactions on Image Processing 2025年 34卷 3622-3634页
作者: Zha, Quanxing Liu, Xin Cheung, Yiu-Ming Peng, Shu-Juan Xu, Xing Wang, Nannan Huaqiao University Department of Computer Science Xiamen 361021 China Key Laboratory of Pattern Recognition and Computer Vision Xiamen 361021 China Huaqiao University Fujian Key Laboratory of Big Data Intelligence and Security Xiamen 361021 China Hong Kong Baptist University Department of Computer Science Hong Kong Huaqiao University Department of Artificial Intelligence Xiamen 361021 China Fujian Province University Key Laboratory of Computer Vision and Machine Learning (Huaqiao University) Xiamen 361021 China University of Electronic Science and Technology of China Center for Future Multimedia School of Computer Science and Engineering Chengdu 610051 China Xidian University State Key Laboratory of Integrated Services Networks Xi’an 710071 China
The manual annotation of perfectly aligned labels for cross-modal retrieval (CMR) is incredibly labor-intensive. As an alternative, the collection of co-occurring data pairs from the Internet is a remarkably cost-effe... 详细信息
来源: 评论
Training Verification-Friendly Neural Networks via Neuron Behavior Consistency
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Zongxin Zhao, Zhe Song, Fu Sun, Jun Yang, Pengfei Huang, Xiaowei Zhang, Lijun Key Laboratory of System Software Chinese Academy of Sciences State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China RealAI Beijing China Nanjing Institute of Software Technology Nanjing China Singapore Management University Singapore College of Computer and Information Science Software College Southwest University Chongqing China The University of Liverpool Liverpool United Kingdom
Formal verification provides critical security assurances for neural networks, yet its practical application suffers from the long verification time. This work introduces a novel method for training verification-frien... 详细信息
来源: 评论
Controllable Quantum Computing Privacy via Inherent Noises and Quantum Error Mitigation
Controllable Quantum Computing Privacy via Inherent Noises a...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: keyi Ju Hui Zhong Xinyue Zhang Xiaoqi Qin Miao Pan State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China Department of Electrical and Computer Engineering University of Houston Houston TX Department of Computer Science Kennesaw State University Marietta GA
Quantum computing has revolutionized the approach to solving complex problems and handling vast datasets. However, data leakage in quantum computing may present privacy risks. While differential privacy (DP) has been ... 详细信息
来源: 评论