咨询与建议

限定检索结果

文献类型

  • 565 篇 期刊文献
  • 359 篇 会议
  • 3 册 图书

馆藏范围

  • 927 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 659 篇 工学
    • 441 篇 计算机科学与技术...
    • 363 篇 软件工程
    • 126 篇 信息与通信工程
    • 91 篇 控制科学与工程
    • 81 篇 电子科学与技术(可...
    • 77 篇 光学工程
    • 73 篇 电气工程
    • 72 篇 生物工程
    • 54 篇 生物医学工程(可授...
    • 42 篇 机械工程
    • 39 篇 材料科学与工程(可...
    • 37 篇 仪器科学与技术
    • 36 篇 化学工程与技术
    • 31 篇 动力工程及工程热...
    • 23 篇 网络空间安全
    • 19 篇 交通运输工程
    • 15 篇 建筑学
    • 15 篇 土木工程
  • 369 篇 理学
    • 160 篇 数学
    • 132 篇 物理学
    • 85 篇 生物学
    • 44 篇 化学
    • 38 篇 系统科学
    • 38 篇 统计学(可授理学、...
  • 158 篇 管理学
    • 87 篇 图书情报与档案管...
    • 80 篇 管理科学与工程(可...
    • 24 篇 工商管理
  • 56 篇 医学
    • 48 篇 临床医学
    • 34 篇 基础医学(可授医学...
    • 26 篇 药学(可授医学、理...
  • 15 篇 法学
  • 11 篇 经济学
  • 8 篇 农学
  • 4 篇 军事学
  • 1 篇 哲学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 25 篇 semantics
  • 16 篇 training
  • 14 篇 machine learning
  • 13 篇 deep learning
  • 10 篇 object detection
  • 10 篇 computational mo...
  • 10 篇 visualization
  • 9 篇 image segmentati...
  • 9 篇 optimization
  • 9 篇 embeddings
  • 9 篇 stochastic syste...
  • 9 篇 clustering algor...
  • 8 篇 deep neural netw...
  • 8 篇 computer archite...
  • 8 篇 contrastive lear...
  • 8 篇 feature extracti...
  • 8 篇 data models
  • 7 篇 three-dimensiona...
  • 7 篇 electroencephalo...
  • 7 篇 educational inst...

机构

  • 45 篇 state key labora...
  • 37 篇 university of ch...
  • 20 篇 college of compu...
  • 19 篇 state key lab of...
  • 18 篇 state key labora...
  • 17 篇 research center ...
  • 15 篇 ji hua laborator...
  • 14 篇 state key labora...
  • 14 篇 zhongguancun lab...
  • 13 篇 peng cheng labor...
  • 12 篇 department of el...
  • 12 篇 tencent ai lab
  • 12 篇 zhejiang lab
  • 11 篇 state key labora...
  • 11 篇 school of comput...
  • 10 篇 school of electr...
  • 10 篇 tencent youtu la...
  • 10 篇 state key labora...
  • 9 篇 university of sc...
  • 9 篇 school of comput...

作者

  • 11 篇 lihua zhang
  • 11 篇 xu linli
  • 11 篇 yang jian
  • 10 篇 timofte radu
  • 10 篇 liu qi
  • 10 篇 cai deng
  • 10 篇 zhang ming
  • 10 篇 xiaoyang kang
  • 9 篇 xiao zhiping
  • 9 篇 chen chun
  • 9 篇 bu jiajun
  • 9 篇 he xiaofei
  • 8 篇 qiu cheng-wei
  • 8 篇 gao yang
  • 8 篇 liu wei
  • 8 篇 jian yang
  • 8 篇 wang jianxin
  • 7 篇 sun fuchun
  • 7 篇 xu tong
  • 7 篇 wei mu

语言

  • 816 篇 英文
  • 88 篇 其他
  • 25 篇 中文
检索条件"机构=TCA Lab of State Key Laboratory of Computer Science"
927 条 记 录,以下是301-310 订阅
排序:
VHM: Versatile and Honest Vision Language Model for Remote Sensing Image Analysis  39
VHM: Versatile and Honest Vision Language Model for Remote S...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Pang, Chao Weng, Xingxing Wu, Jiang Li, Jiayu Liu, Yi Sun, Jiaxing Li, Weijia Wang, Shuai Feng, Litong Xia, Gui-Song He, Conghui School of Artificial Intelligence Wuhan University China Shanghai Artificial Intelligence Laboratory China School of Computer Science Wuhan University China Sun Yat-Sen University China Sensetime Research China State Key Lab. of LIESMARS Wuhan University China Institue for Math and AI Wuhan University China
This paper develops a Versatile and Honest vision language Model (VHM) for remote sensing image analysis. VHM is built on a large-scale remote sensing image-text dataset with rich-content captions (VersaD), and an hon... 详细信息
来源: 评论
Advswap: Covert Adversarial Perturbation with High Frequency Info-Swapping for Autonomous Driving Perception
Advswap: Covert Adversarial Perturbation with High Frequency...
收藏 引用
International Conference on Intelligent Transportation
作者: Yuanhao Huang Qinfan Zhang Jiandong Xing Mengyue Cheng Haiyang Yu Yilong Ren Xiao Xiong School of Transportation Science and Engineering Beihang University Beijing P.R.China State Key Lab of Intelligent Transportation System Beijing P.R.China Zhongguancun Laboratory Beijing P.R.China Department of Electrical and Computer Engineering University of Alberta Edmonton Canada
Perception module of Autonomous vehicles (AVs) are increasingly susceptible to be attacked, which exploit vulnerabilities in neural networks through adversarial inputs, thereby compromising the AI safety. Some researc... 详细信息
来源: 评论
Beyond Model Scale Limits: End-Edge-Cloud Federated Learning with Self-Rectified Knowledge Agglomeration
arXiv
收藏 引用
arXiv 2024年
作者: Wu, Zhiyuan Sun, Sheng Wang, Yuwei Liu, Min Xu, Ke Pan, Quyang Gao, Bo Wen, Tian The State Key Lab of Processers Institute of Computing Technology Chinese Academy of Sciences Beijing China The University of Chinese Academy of Sciences Beijing China The Zhongguancun Laboratory Beijing China The Department of Computer Science and Technology Tsinghua University Beijing China The School of Computer Science and Technology The Engineering Research Center of Network Management Technology for High-Speed Railway of Ministry of Education Beijing Jiaotong University Beijing China
The rise of End-Edge-Cloud Collaboration (EECC) offers a promising paradigm for Artificial Intelligence (AI) model training across end devices, edge servers, and cloud data centers, providing enhanced reliability and ... 详细信息
来源: 评论
Insulin-resistance and depression cohort data mining to identify nutraceutical related DNA methylation biomarker for type 2 diabetes
收藏 引用
Genes & Diseases 2021年 第5期8卷 669-676页
作者: Fengji Liang Yuan Quan Andong Wu Ying Chen Ruifeng Xu Yuexing Zhu Jianghui Xiong Lab of Epigenetics and Advanced Health Technology SPACEnter Space Science and Technology InstituteShenzhenGuangdong Province518117PR China State Key Laboratory of Space Medicine Fundamentals and Application China Astronaut Research and Training CenterBeijing100094PR China School of Computer Science and Technology Harbin Institute of Technology Shenzhen Graduate SchoolShenzhenGuangdong Province518055PR China
Insulin-resistance(IR)is one of the most important precursors of type 2 diabetes(T2D).Recent evidence suggests an association of depression with the onset of ***-lating evidence shows that depression and T2D share com... 详细信息
来源: 评论
High-Throughput GPU Implementation of Dilithium Post-Quantum Digital Signature
arXiv
收藏 引用
arXiv 2022年
作者: Shen, Shiyu Yang, Hao Dai, Wangchen Zhang, Hong Liu, Zhe Zhao, Yunlei School of Computer Science Fudan University Shanghai China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China Research Institute of Basic Theories Zhejiang lab Hangzhou China State Key Laboratory of Cryptology Beijing China
Digital signatures are fundamental building blocks in various protocols to provide integrity and authenticity. The development of the quantum computing has raised concerns about the security guarantees afforded by cla... 详细信息
来源: 评论
Contour detection in Cassini ISS images based on Hierarchical Extreme Learning Machine and Dense Conditional Random Field
收藏 引用
Research in Astronomy and Astrophysics 2020年 第1期20卷 83-92页
作者: Xi-Qi Yang Qing-Feng Zhang Zhan Li Department of Computer Science Jinan UniversityGuangzhou 510632China State Key Lab of CAD&CG Zhejiang UniversityHangzhou 310000China Sino-French Joint Laboratory for Astrometry Dynamics and Space ScienceJinan UniversityGuangzhou 510632China
In Cassini ISS(Imaging science Subsystem)images,contour detection is often performed on disk-resolved objects to accurately locate their ***,contour detection is a key *** edge detection methods,such as Canny and Robe... 详细信息
来源: 评论
DRL-Based Optimization for AoI and Energy Consumption in C-V2X Enabled IoV
IEEE Transactions on Green Communications and Networking
收藏 引用
IEEE Transactions on Green Communications and Networking 2025年
作者: Zhang, Zheng Wu, Qiong Fan, Pingyi Cheng, Nan Chen, Wen Letaief, Khaled B. Jiangnan University School of Internet of Things Engineering Wuxi214122 China Tsinghua University Beijing National Research Center for Information Science and Technology Department of Electronic Engineering State Key laboratory of Space Network and Communications Tsinghua University Beijing100084 China Xidian University State Key Lab. of ISN School of Telecom-munications Engineering Xi'an710071 China Shanghai Jiao Tong University Department of Electronic Engineering Shanghai200240 China Department of Electrical and Computer Engineer-ing Hong Kong
To address communication latency issues, the Third Generation Partnership Project (3GPP) has defined Cellular-Vehicle to Everything (C-V2X) technology, which includes Vehicle-to-Vehicle (V2V) communication for direct ... 详细信息
来源: 评论
VIPeR: Visual Incremental Place Recognition with Adaptive Mining and Continual Learning
arXiv
收藏 引用
arXiv 2024年
作者: Ming, Yuhang Xu, Minyang Yang, Xingrui Ye, Weicai Wang, Weihan Peng, Yong Dai, Weichen Kong, Wanzeng School of Computer Science Hangzhou Dianzi University Key Laboratory of Brain Machine Collaborative Intelligence of Zhejiang Province Hangzhou310018 China High-speed Aerodynamics Institute CARDC Mianyang621000 China State Key Lab of CAD&CG Zhejiang University Hangzhou310058 China Stevens Institute of Technology HobokenNJ07030 United States
Visual place recognition (VPR) is essential to many autonomous systems. Existing VPR methods demonstrate attractive performance at the cost of limited generalizability. When deployed in unseen environments, these meth... 详细信息
来源: 评论
Distributed Online Convex Optimization with Time-Varying Constraints: Tighter Cumulative Constraint Violation Bounds under Slater's Condition
收藏 引用
IEEE Transactions on Automatic Control 2025年
作者: Yi, Xinlei Li, Xiuxian Yang, Tao Xie, Lihua Hong, Yiguang Chai, Tianyou Johansson, Karl H. National Key Laboratory of Autonomous Intelligent Unmanned Systems Shanghai Institute of Intelligent Science and Technology China Ministry of Education Frontiers Science Center for Intelligent Autonomous Systems China Massachusetts Institute of Technology Lab for Information & Decision Systems CambridgeMA02139 United States Northeastern University State Key Laboratory of Synthetical Automation for Process Industries Shenyang110819 China Nanyang Technological University School of Electrical and Electronic Engineering 50 Nanyang Avenue 639798 Singapore Kth Royal Institute of Technology Division of Decision and Control Systems School of Electrical Engineering and Computer Science Sweden Digital Futures Stockholm10044 Sweden
This paper considers distributed online convex optimization with time-varying constraints. In this setting, a network of agents makes decisions at each round, and then only a portion of the loss function and a coordin... 详细信息
来源: 评论
Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders
Devils in the Clouds: An Evolutionary Study of Telnet Bot Lo...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Yuhui Zhu Zhenxiang Chen Qiben Yan Shanshan Wang Alberto Giaretta Enlong Li Lizhi Peng Chuan Zhao Mauro Conti Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan China School of Information Science and Engineering University of Jinan China Department of Computer Science and Engineering Michigan State University USA AASS MPI Lab Örebro University Sweden Department of Mathematics University of Padua Italy
One of the innovations brought by Mirai and its derived malware is the adoption of self-contained loaders for infecting IoT devices and recruiting them in botnets. Functionally decoupled from other botnet components a...
来源: 评论