咨询与建议

限定检索结果

文献类型

  • 2,904 篇 会议
  • 2,484 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 5,402 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,748 篇 工学
    • 2,819 篇 计算机科学与技术...
    • 2,308 篇 软件工程
    • 693 篇 信息与通信工程
    • 501 篇 控制科学与工程
    • 329 篇 生物工程
    • 303 篇 电气工程
    • 276 篇 电子科学与技术(可...
    • 265 篇 机械工程
    • 213 篇 光学工程
    • 191 篇 生物医学工程(可授...
    • 152 篇 仪器科学与技术
    • 137 篇 化学工程与技术
    • 135 篇 动力工程及工程热...
    • 97 篇 网络空间安全
    • 84 篇 土木工程
    • 82 篇 建筑学
  • 1,814 篇 理学
    • 1,122 篇 数学
    • 387 篇 物理学
    • 371 篇 生物学
    • 305 篇 统计学(可授理学、...
    • 237 篇 系统科学
    • 139 篇 化学
  • 1,078 篇 管理学
    • 662 篇 管理科学与工程(可...
    • 448 篇 图书情报与档案管...
    • 216 篇 工商管理
  • 145 篇 医学
    • 122 篇 临床医学
    • 100 篇 基础医学(可授医学...
    • 75 篇 药学(可授医学、理...
  • 135 篇 法学
    • 100 篇 社会学
  • 76 篇 经济学
    • 76 篇 应用经济学
  • 53 篇 教育学
  • 47 篇 农学
  • 17 篇 文学
  • 15 篇 艺术学
  • 14 篇 军事学

主题

  • 179 篇 computer science
  • 135 篇 laboratories
  • 132 篇 semantics
  • 96 篇 feature extracti...
  • 94 篇 wireless sensor ...
  • 91 篇 optimization
  • 88 篇 training
  • 81 篇 data mining
  • 80 篇 computational mo...
  • 76 篇 software
  • 74 篇 deep learning
  • 70 篇 algorithm design...
  • 62 篇 software enginee...
  • 61 篇 clustering algor...
  • 61 篇 testing
  • 60 篇 cloud computing
  • 58 篇 accuracy
  • 58 篇 web services
  • 57 篇 software testing
  • 56 篇 application soft...

机构

  • 1,057 篇 state key labora...
  • 224 篇 department of co...
  • 219 篇 national key lab...
  • 174 篇 department of co...
  • 139 篇 school of inform...
  • 116 篇 state key labora...
  • 114 篇 state key labora...
  • 108 篇 state key labora...
  • 100 篇 college of compu...
  • 85 篇 university of ch...
  • 81 篇 shandong provinc...
  • 80 篇 school of comput...
  • 71 篇 shandong provinc...
  • 67 篇 department of co...
  • 59 篇 school of softwa...
  • 57 篇 shanghai key lab...
  • 56 篇 school of artifi...
  • 51 篇 state key labora...
  • 51 篇 state key labora...
  • 47 篇 state key labora...

作者

  • 66 篇 gao yang
  • 46 篇 shi yinghuan
  • 42 篇 guihai chen
  • 42 篇 dou wanchun
  • 38 篇 sanglu lu
  • 37 篇 zhou zhi-hua
  • 36 篇 li wu-jun
  • 32 篇 baowen xu
  • 32 篇 junping du
  • 31 篇 shen furao
  • 31 篇 yu huiqun
  • 30 篇 xu baowen
  • 29 篇 zhao jian
  • 28 篇 fan guisheng
  • 28 篇 liu hong
  • 27 篇 lu sanglu
  • 27 篇 zhang lijun
  • 26 篇 yang tianbao
  • 25 篇 wanchun dou
  • 25 篇 xu xiaolong

语言

  • 5,043 篇 英文
  • 206 篇 其他
  • 153 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novel Software Technology Department of Computer Science and Technology"
5402 条 记 录,以下是351-360 订阅
排序:
Air-Ground Collaborative Mobile Edge Computing:Architecture,Challenges,and Opportunities
收藏 引用
China Communications 2024年 第5期21卷 1-16页
作者: Qin Zhen He Shoushuai Wang Hai Qu Yuben Dai Haipeng Xiong Fei Wei Zhenhua Li Hailong College of Communications Engineering Army Engineering University of PLANanjing 210000China Department of Information and Communication Noncommissioned Officer Academy of PAPHangzhou 310000China Key Laboratory of Dynamic Cognitive System of Electromagnetic Spectrum Space Ministry of Industry and Information TechnologyNanjing 211106China College of Electronic and Information Engineering Nanjing University of Aeronautics and AstronauticsNanjing 211106China State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing 210023China CMC Political and Law Commission Beijing100120China Xi’an Research Institute of High Technology Xi’an 710025China
By pushing computation,cache,and network control to the edge,mobile edge computing(MEC)is expected to play a leading role in fifth generation(5G)and future sixth generation(6G).Nevertheless,facing ubiquitous fast-grow... 详细信息
来源: 评论
Block Ciphers Identification Scheme Based on Randomness Test  6
Block Ciphers Identification Scheme Based on Randomness Test
收藏 引用
6th International Workshop on Advanced Algorithms and Control Engineering, IWAACE 2022
作者: Yu, Xiuli Shi, Kai School of Computer Science and Engineering Tianjin University of Technology Tianjin300384 China Country Tianjin Key Laboratory of Intelligent and Novel Software Technology Tianjin University of Technology Tianjin300384 China
In real scenarios, cryptanalysts can only obtain ciphertext of unknown cryptographic algorithms to conduct ciphertext only attacks. Cryptosystem identification is a prerequisite for further cryptanalysis. This paper p... 详细信息
来源: 评论
Deep Learning Object Detection  7th
Deep Learning Object Detection
收藏 引用
7th International Conference on Smart Computing and Communication, SmartCom 2022
作者: Liu, Jingnian Huang, Weihong Xiao, Lijun Huo, Yingzi Xiong, Huixuan Li, Xiong Xiao, Weidong School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan411201 China Hunan Key Laboratory for Service Computing and Novel Software Technology Xiangtan411201 China Guangdong Financial High-Tech Zone "Blockchain +" Fintech Research Institute Foshan528253 China School of Computer Science and Engineering University of Electronic Science and Technology of China Xiangtan411201 China School of Software Engineering Xiamen University of Technology Xiamen361024 China
Object detection techniques are a major part of computer vision research, with large-scale applications in industrial, scientific and other scenarios. Technologies such as face detection, medical image detection, auto... 详细信息
来源: 评论
Blockchain Development  7th
Blockchain Development
收藏 引用
7th International Conference on Smart Computing and Communication, SmartCom 2022
作者: Xie, Siqi Cai, Jiahong Zhu, Hangyu Yang, Ce Chen, Lin Xiao, Weidong School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan411201 China Hunan Key Laboratory for Service Computing and Novel Software Technology Xiangtan411201 China Guangdong Financial High-Tech Zone "Blockchain +" Fintech Research Institute Foshan528253 China School of Software Engineering Xiamen University of Technology Xiamen361024 China
In recent years, blockchain research has set off an upsurge in academia, and it is called the next generation of value Internet. Because of its decentralization, anonymity, security, immutability, traceability and oth... 详细信息
来源: 评论
UltraEdit: Instruction-based Fine-Grained Image Editing at Scale  38
UltraEdit: Instruction-based Fine-Grained Image Editing at S...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Zhao, Haozhe Ma, Xiaojian Chen, Liang Si, Shuzheng Wu, Rujie An, Kaikai Yu, Peiyu Zhang, Minjia Li, Qing Chang, Baobao National Key Laboratory for Multimedia Information Processing Peking University China State Key Laboratory of General Artificial Intelligence BIGAI China School of Software and Microelectronics Peking University China Department of Computer Science and Technology Tsinghua University China School of Computer Science Peking University China UCLA United States UIUC United States
This paper presents ULTRAEDIT, a large-scale (~4M editing samples), automatically generated dataset for instruction-based image editing. Our key idea is to address the drawbacks in existing image editing datasets like...
来源: 评论
Confidence-aware contrastive learning for selective classification  24
Confidence-aware contrastive learning for selective classifi...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Yu-Chang Wu Shen-Huan Lyu Haopu Shang Xiangyu Wang Chao Qian National Key Laboratory for Novel Software Technology and School of Artificial Intelligence Nanjing University China Key Laboratory of Water Big Data Technology of Ministry of Water Resources and College of Computer Science and Software Engineering Hohai University China and National Key Laboratory for Novel Software Technology Nanjing University China
Selective classification enables models to make predictions only when they are sufficiently confident, aiming to enhance safety and reliability, which is important in high-stakes scenarios. Previous methods mainly use...
来源: 评论
Degradation-Resistant Offline Optimization via Accumulative Risk Control  26
Degradation-Resistant Offline Optimization via Accumulative ...
收藏 引用
26th European Conference on Artificial Intelligence, ECAI 2023
作者: Lu, Huakang Qian, Hong Wu, Yupeng Liu, Ziqi Zhang, Ya-Lin Zhou, Aimin Yu, Yang Shanghai Institute of Ai for Education School of Computer Science and Technology East China Normal University Shanghai200062 China National Key Laboratory for Novel Software Technology Nanjing University Nanjing210023 China Ant Group Hangzhou310023 China
Offline optimization aims to elaborately construct a solution that optimizes a black-box function with only access to the offline dataset. A typical manner of constructing the solution is to train a surrogate model of...
来源: 评论
A Crowdsourcing Digital Forensics Platform for IoT Environments Powered by Blockchain
A Crowdsourcing Digital Forensics Platform for IoT Environme...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Yaqing Zhang Xiao Fu Bin Luo Xiaojiang Du State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Electrical and Computer Engineering Stevens Institute of Technology Hoboken NJ USA
Digital forensics is a security research field that has evolved with the advancement of digital technologies, such as computer and network technology. With the emergence of complex forensic environments, such as those... 详细信息
来源: 评论
E²GO: Free Your Hands for Smartphone Interaction
收藏 引用
International Journal of Human-computer Interaction 2025年
作者: Yan, Shaoming Ju, Yuanliang Quan, Rong Tu, Huawei Liang, Dong MIIT Key Laboratory of Pattern Analysis and Machine Intelligence Collaborative Innovation Center of Novel Software Technology and Industrialization College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China Department of Computer Science and Information Technology La Trobe University Melbourne Australia
Current eye-gaze interaction technologies for smartphones are considered inflexible, inaccurate, and power-hungry. These methods typically rely on hand involvement and accomplish partial interactions. In this paper, w... 详细信息
来源: 评论
Privacy Protection in Palmprint Recognition via Pruning Frequency Channels  18th
Privacy Protection in Palmprint Recognition via Pruning Fr...
收藏 引用
18th Chinese Conference on Biometric Recognition, CCBR 2024
作者: Shi, Siyu Shao, Huikai Zhong, Dexing School of Automation Science and Engineering Xi’an Jiaotong University Shaanxi Xi’an710049 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Xi’an Yizhanghui Technology Co. Shannxi Xi’an712000 China Pazhou Laboratory Guangzhou510335 China Research Institute of Xi’an Jiaotong University Zhejiang311215 China
Palmprint recognition is an emerging biometric technology with many advantages. However, there is some sensitive personal information in palmprint images. Once accessed by unauthorized malicious third parties, it may ... 详细信息
来源: 评论