咨询与建议

限定检索结果

文献类型

  • 151 篇 会议
  • 67 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 219 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 153 篇 工学
    • 127 篇 计算机科学与技术...
    • 103 篇 软件工程
    • 49 篇 信息与通信工程
    • 27 篇 控制科学与工程
    • 20 篇 电气工程
    • 18 篇 生物工程
    • 11 篇 电子科学与技术(可...
    • 9 篇 化学工程与技术
    • 8 篇 动力工程及工程热...
    • 8 篇 生物医学工程(可授...
    • 5 篇 材料科学与工程(可...
    • 4 篇 光学工程
    • 4 篇 网络空间安全
    • 3 篇 仪器科学与技术
    • 3 篇 建筑学
    • 3 篇 土木工程
    • 3 篇 交通运输工程
  • 72 篇 理学
    • 42 篇 数学
    • 20 篇 生物学
    • 12 篇 物理学
    • 11 篇 化学
    • 8 篇 统计学(可授理学、...
    • 7 篇 系统科学
  • 54 篇 管理学
    • 33 篇 图书情报与档案管...
    • 22 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 8 篇 医学
    • 6 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 4 篇 法学
    • 3 篇 社会学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 8 篇 software enginee...
  • 7 篇 semantics
  • 7 篇 web services
  • 7 篇 training
  • 4 篇 linux
  • 4 篇 deep neural netw...
  • 4 篇 computer archite...
  • 4 篇 machine learning
  • 4 篇 software
  • 3 篇 computer science
  • 3 篇 software systems
  • 3 篇 knowledge engine...
  • 3 篇 reliability
  • 3 篇 deep learning
  • 3 篇 operating system...
  • 3 篇 electronic mail
  • 3 篇 quality of servi...
  • 3 篇 energy consumpti...
  • 3 篇 costs
  • 3 篇 topology

机构

  • 19 篇 school of comput...
  • 18 篇 school of softwa...
  • 18 篇 school of cyber ...
  • 17 篇 hubei key labora...
  • 16 篇 national enginee...
  • 16 篇 hubei engineerin...
  • 15 篇 services computi...
  • 14 篇 cluster and grid...
  • 11 篇 school of inform...
  • 9 篇 state key lab. o...
  • 5 篇 national enginee...
  • 4 篇 college of compu...
  • 4 篇 school of big da...
  • 4 篇 dept. of compute...
  • 4 篇 national univers...
  • 4 篇 state key lab of...
  • 4 篇 national enginee...
  • 4 篇 system and softw...
  • 4 篇 school of electr...
  • 4 篇 system and softw...

作者

  • 13 篇 hu shengshan
  • 13 篇 jin hai
  • 13 篇 li minghui
  • 11 篇 baik doo-kwon
  • 11 篇 hai jin
  • 9 篇 zhang leo yu
  • 9 篇 lee cheol-hoon
  • 7 篇 zhou ziqi
  • 6 篇 jonckers viviane
  • 6 篇 wan wei
  • 6 篇 vanderperren wim
  • 6 篇 minghui li
  • 6 篇 d'hondt maja
  • 6 篇 shengshan hu
  • 5 篇 lee jae-woo
  • 5 篇 wang xianlong
  • 4 篇 wan yao
  • 4 篇 xue lulu
  • 4 篇 leo yu zhang
  • 4 篇 kim do-hyung

语言

  • 206 篇 英文
  • 7 篇 中文
  • 5 篇 其他
  • 1 篇 德文
检索条件"机构=System and Software Engineering Lab"
219 条 记 录,以下是41-50 订阅
排序:
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Yechao Hu, Shengshan Zhang, Leo Yu Shi, Junyu Li, Minghui Liu, Xiaogeng Wan, Wei Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Adversarial examples for deep neural networks (DNNs) have been shown to be transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectur... 详细信息
来源: 评论
3A-YOLO: New Real-Time Object Detectors with Triple Discriminative Awareness and Coordinated Representations
arXiv
收藏 引用
arXiv 2024年
作者: Wu, Xuecheng Xue, Junxiao Fu, Liangyu Nie, Jiayu Huang, Danlei Yin, Xinyi School of Computer Science and Technology Xi’an Jiaotong University Xi’an China Research Center for Space Computing System Zhejiang Lab Hangzhou China School of Software Northwestern Polytechnical University Xi’an China School of Cyber Science and Engineering Zhengzhou University Zhengzhou China
Recent research on real-time object detectors (e.g., YOLO series) has demonstrated the effectiveness of attention mechanisms for elevating model performance. Nevertheless, existing methods neglect to unifiedly deploy ... 详细信息
来源: 评论
MISA: UNVEILING THE VULNERABILITIES IN SPLIT FEDERATED LEARNING
arXiv
收藏 引用
arXiv 2023年
作者: Wan, Wei Ning, Yuxuan Hu, Shengshan Xue, Lulu Li, Minghui Zhang, Leo Yu Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab China
Federated learning (FL) and split learning (SL) are prevailing distributed paradigms in recent years. They both enable shared global model training while keeping data localized on users' devices. The former excels...
来源: 评论
SpirDet: Towards Efficient, Accurate and Lightweight Infrared Small Target Detector
arXiv
收藏 引用
arXiv 2024年
作者: Mao, Qianchen Li, Qiang Wang, Bingshu Zhang, Yongjun Dai, Tao Chen, C.L. Philip The School of Software Northwestern Polytechnical University Taicang Campus Suzhou215400 China The School of Software Northwestern Polytechnical University Xi’an710129 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China The State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China The College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China The School of Computer Science and Engineering South China University of Technology and Pazhou Lab Guangzhou510641 China
In recent years, the detection of infrared small targets using deep learning methods has garnered substantial attention due to notable advancements. To improve the detection capability of small targets, these methods ... 详细信息
来源: 评论
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Xiaogeng Li, Minghui Wang, Haoyu Hu, Shengshan Ye, Dengpan Jin, Hai Wu, Libing Xiao, Chaowei School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab China School of Cyber Science and Engineering Wuhan University China Arizona State University United States
Deep neural networks are proven to be vulnerable to backdoor attacks. Detecting the trigger samples during the inference stage, i.e., the test-time trigger sample detection, can prevent the backdoor from being trigger... 详细信息
来源: 评论
TCSloT: Text Guided 3D Context and Slope Aware Triple Network for Dental Implant Position Prediction
TCSloT: Text Guided 3D Context and Slope Aware Triple Networ...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Xinquan Yang Jinheng Xie Xuechen Li Xuguang Li Linlin Shen Yongqiang Deng College of Computer Science and Software Engineering Shenzhen University Shenzhen China Show Lab National University of Singapore Singapore National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Department of Stomatology Shenzhen University General Hospital Shenzhen China
In implant prosthesis treatment, the surgical guide of implant is used to ensure accurate implantation. However, such design heavily relies on the manual location of the implant position. When deep neural network has ...
来源: 评论
Can Large Language Models Serve as Evaluators for Code Summarization?
arXiv
收藏 引用
arXiv 2024年
作者: Wu, Yang Wan, Yao Chu, Zhaoyang Zhao, Wenting Liu, Ye Zhang, Hongyu Shi, Xuanhua Yu, Philip S. Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Big Data and Social Computing Lab University of Illinois Chicago Chicago United States Salesforce Research Palo Alto United States School of Big Data and Software Engineering Chongqing University Chongqing China
Code summarization facilitates program comprehension and software maintenance by converting code snippets into natural-language descriptions. Over the years, numerous methods have been developed for this task, but a k... 详细信息
来源: 评论
Notes on the Architecture, League Training and PFSP in AlphaStar  16
Notes on the Architecture, League Training and PFSP in Alpha...
收藏 引用
16th IEEE International Conference on Intelligent systems and Knowledge engineering, ISKE 2021
作者: Zhao, Jianyang Zhou, Ningning Hong, Long Huaiyin Institute of Technology Faculty of Computer and Software Engineering Huaian China School of Computer Nanjing University of Posts and Telecommunications Nanjing China Research Center for Logic and Intelligent Computation National-Local Joint Engineering Lab of System Credibility Automatic Verification Huaian China
AlphaStar, a multi-agent intelligence program, is a new member of Alpha's gamer software. Rated at Grandmaster level in the empirical evaluation shows that AlphaStar has been a great success in engineering, which ... 详细信息
来源: 评论
Model Predictive Control with Reach-avoid Analysis
arXiv
收藏 引用
arXiv 2023年
作者: Ren, Dejin Lu, Wanli Lv, Jidong Zhang, Lijun Xue, Bai State Key Lab. of Computer Science Institute of Software CAS Beijing China University of Chinese Academy of Sciences Beijing China National Engineering Research Center of Rail Transportation Operation and Control System Beijing Jiaotong University Beijing China
In this paper we investigate the optimal controller synthesis problem, so that the system under the controller can reach a specified target set while satisfying given constraints. Existing model predictive control (MP... 详细信息
来源: 评论
An Attribute Word Extraction Model Incorporating RoBERTa and CRF
An Attribute Word Extraction Model Incorporating RoBERTa and...
收藏 引用
Human-Centered Cognitive systems (HCCS)
作者: Mingzheng Liu Bo Li Jingrui Dai Huacheng Zhang Huibing Zhang Institute of logistic science and technology Academy of system Engineering Academy of military science Beijing China Guangxi Key Lab of Trusted Software Guilin University of Electronic Technology Guilin China
The accuracy of attribute word extraction directly affects the effects of aspect-based sentiment analysis. Traditional attribute word extraction methods disregard the impact of polysemy on extraction results. This pap... 详细信息
来源: 评论