咨询与建议

限定检索结果

文献类型

  • 631 篇 期刊文献
  • 543 篇 会议
  • 1 册 图书

馆藏范围

  • 1,175 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 825 篇 工学
    • 554 篇 计算机科学与技术...
    • 468 篇 软件工程
    • 195 篇 信息与通信工程
    • 112 篇 生物工程
    • 88 篇 光学工程
    • 77 篇 电气工程
    • 74 篇 化学工程与技术
    • 72 篇 生物医学工程(可授...
    • 70 篇 电子科学与技术(可...
    • 67 篇 控制科学与工程
    • 43 篇 机械工程
    • 29 篇 交通运输工程
    • 27 篇 材料科学与工程(可...
    • 27 篇 建筑学
    • 26 篇 动力工程及工程热...
    • 25 篇 土木工程
    • 23 篇 仪器科学与技术
  • 431 篇 理学
    • 197 篇 数学
    • 126 篇 生物学
    • 118 篇 物理学
    • 62 篇 统计学(可授理学、...
    • 51 篇 化学
    • 24 篇 系统科学
  • 205 篇 管理学
    • 108 篇 管理科学与工程(可...
    • 108 篇 图书情报与档案管...
    • 29 篇 工商管理
  • 57 篇 医学
    • 51 篇 临床医学
    • 38 篇 基础医学(可授医学...
    • 25 篇 药学(可授医学、理...
  • 32 篇 法学
    • 27 篇 社会学
  • 19 篇 农学
  • 16 篇 经济学
  • 11 篇 教育学
  • 3 篇 文学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 38 篇 semantics
  • 31 篇 feature extracti...
  • 23 篇 machine learning
  • 22 篇 training
  • 21 篇 deep learning
  • 20 篇 object detection
  • 19 篇 forecasting
  • 15 篇 deep neural netw...
  • 14 篇 task analysis
  • 12 篇 conferences
  • 12 篇 data mining
  • 12 篇 contrastive lear...
  • 10 篇 neural networks
  • 10 篇 computational mo...
  • 10 篇 classification (...
  • 10 篇 data models
  • 9 篇 optimization
  • 9 篇 graph neural net...
  • 9 篇 benchmarking
  • 9 篇 embeddings

机构

  • 39 篇 school of cyber ...
  • 37 篇 university of ch...
  • 33 篇 school of comput...
  • 27 篇 national enginee...
  • 26 篇 hubei key labora...
  • 26 篇 hubei engineerin...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 22 篇 school of inform...
  • 22 篇 sjtu-pinghu inst...
  • 21 篇 pazhou lab
  • 18 篇 key lab of data ...
  • 18 篇 department of co...
  • 18 篇 school of softwa...
  • 16 篇 fujian provincia...
  • 16 篇 school of inform...
  • 15 篇 state key lab of...
  • 15 篇 research center ...
  • 14 篇 school of softwa...
  • 14 篇 beijing key lab ...

作者

  • 29 篇 jin hai
  • 28 篇 li xirong
  • 22 篇 hai jin
  • 19 篇 zhou linjie
  • 18 篇 chen jianping
  • 18 篇 liu jun
  • 18 篇 hu shengshan
  • 18 篇 lu liangjun
  • 14 篇 zhang leo yu
  • 14 篇 pan jeng-shyang
  • 13 篇 chen hong
  • 13 篇 li minghui
  • 12 篇 li cuiping
  • 12 篇 zhou ziqi
  • 10 篇 jia weijia
  • 10 篇 yang gang
  • 9 篇 li jingbing
  • 9 篇 xue xingsi
  • 9 篇 linjie zhou
  • 9 篇 zhang lingling

语言

  • 1,109 篇 英文
  • 58 篇 其他
  • 8 篇 中文
检索条件"机构=The Key Lab of Data Engineering and Kowledge Engineering"
1175 条 记 录,以下是181-190 订阅
排序:
DA-BEV: Unsupervised Domain Adaptation for Bird's Eye View Perception
arXiv
收藏 引用
arXiv 2024年
作者: Jiang, Kai Huang, Jiaxing Xie, Weiying Lei, Jie Li, Yunsong Shao, Ling Lu, Shijian State Key Laboratory of Integrated Services Networks Xidian University Xi'An710071 China S-lab School of Computer Science and Engineering Nanyang Technological University Singapore UCAS-Terminus AI Lab University of Chinese Academy of Sciences China School of Electrical and Data Engineering The University of Technology Sydney Australia
Camera-only Bird's Eye View (BEV) has demonstrated great potential in environment perception in a 3D space. However, most existing studies were conducted under a supervised setup which cannot scale well while hand... 详细信息
来源: 评论
Flooded Cropland Mapping Based on GF-3 and Mapbox Imagery Using Semantic Segmentation: A Case Study of Typhoon Siamba in Western Guangdong in July 2022
Flooded Cropland Mapping Based on GF-3 and Mapbox Imagery Us...
收藏 引用
2022 International Conference on Geographic Information and Remote Sensing Technology, GIRST 2022
作者: Ku, Mengjun Jiang, Hao Li, Dan Wang, Chongyang Key Lab of Guangdong for Utilization of Remote Sensing and Geographical Information System Guangdong Open Laboratory of Geospatial Information Technology and Application Research Center of Guangdong Province for Engineering Technology Application of Remote Sensing Big Data Guangzhou Institute of Geography Guangdong Academy of Sciences Guangzhou510070 China Guangdong University of Technology Guangzhou China
Typhoon Siamba made landfall in Western Guangdong on July 2, 2022, causing great losses to crops in western Guangdong. Radar remote sensing can penetrate through clouds and fog, is suitable for identifying flooded are... 详细信息
来源: 评论
NumbOD: A Spatial-Frequency Fusion Attack Against Object Detectors
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Li, Bowen Song, Yufei Yu, Zhifei Hu, Shengshan Wan, Wei Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the advancement of deep learning, object detectors (ODs) with various architectures have achieved significant success in complex scenarios like autonomous driving. Previous adversarial attacks against ODs have be... 详细信息
来源: 评论
Suppress Content Shift: Better Diffusion Features via Off-the-Shelf Generation Techniques  38
Suppress Content Shift: Better Diffusion Features via Off-th...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Meng, Benyuan Xu, Qianqian Wang, Zitai Yang, Zhiyong Cao, Xiaochun Huang, Qingming Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China Peng Cheng Laboratory China School of Computer Science and Tech. University of Chinese Academy of Sciences China School of Cyber Science and Tech. Shenzhen Campus of Sun Yat-sen University China Key Laboratory of Big Data Mining and Knowledge Management CAS China
Diffusion models are powerful generative models, and this capability can also be applied to discrimination. The inner activations of a pre-trained diffusion model can serve as features for discriminative tasks, namely...
来源: 评论
A Method of Extracting Discipline Inspection Cases Based on Deep Learning  3
A Method of Extracting Discipline Inspection Cases Based on ...
收藏 引用
3rd International Conference on Education, Knowledge and Information Management, ICEKIM 2022
作者: Liu, XiaoLing Chen, JunJie Gao, Jing Fan, Hao Dong, JianMin Inner Mongolia Agricultural University College of Computer and Information Engineering China Inner Mongolia Autonomous Reg. Key Lab. of Large Data Res. and Applic. of Agric. and Anim. Husbandry China Inner Mongolia Discipline Inspection and Supervision Big Data Laboratory Hohhot China
Event extraction is one of the key tasks in information extraction tasks, and it has been widely used in various fields in recent years. In the field of disciplinary inspection and supervision, disciplinary inspection... 详细信息
来源: 评论
PS3: Precise Patch Presence Test Based on Semantic Symbolic Signature
PS3: Precise Patch Presence Test Based on Semantic Symbolic ...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Qi Zhan Xing Hu Zhiyang Li Xin Xia David Lo Shanping Li The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Zhejiang University Hangzhou China Software Engineering Application Technology Lab Huawei China Singapore Management University Singapore
During software development, vulnerabilities have posed a significant threat to users. Patches are the most effective way to combat vulnerabilities. In a large-scale software system, testing the presence of a security... 详细信息
来源: 评论
Machine Learning is All You Need: A Simple Token-Based Approach for Effective Code Clone Detection
Machine Learning is All You Need: A Simple Token-Based Appro...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Siyue Feng Wenqi Suo Yueming Wu Deqing Zou Yang Liu Hai Jin Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab Jinyinhu Laboratory Wuhan China School of Cyber Science and Engineering HUST Wuhan China Nanyang Technological University Singapore School of Computer Science and Technology HUST Wuhan China
As software engineering advances and the code demand rises, the prevalence of code clones has increased. This phenomenon poses risks like vulnerability propagation, underscoring the growing importance of code clone de... 详细信息
来源: 评论
Not All Diffusion Model Activations Have Been Evaluated as Discriminative Features  38
Not All Diffusion Model Activations Have Been Evaluated as D...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Meng, Benyuan Xu, Qianqian Wang, Zitai Cao, Xiaochun Huang, Qingming Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China Peng Cheng Laboratory China School of Cyber Science and Tech. Shenzhen Campus of Sun Yat-sen University China School of Computer Science and Tech. University of Chinese Academy of Sciences China Key Laboratory of Big Data Mining and Knowledge Management CAS China
Diffusion models are initially designed for image generation. Recent research shows that the internal signals within their backbones, named activations, can also serve as dense features for various discriminative task...
来源: 评论
Service composition based on hierarchical state machine
Service composition based on hierarchical state machine
收藏 引用
2021 International Conference on Computer Technology and Media Convergence Design, CTMCD 2021
作者: Zhang, Sa Zhu, Xuefeng Beijing Key Lab of Petroleum Data Mining Department of Computer Science College of Information Science and Engineering China University of Petroleum Beijing Beijing China
There have been many research methods on Web service composition, and state machine is one of them. The service composition based on the state machine is easier to understand, more intuitive and clearer than other met... 详细信息
来源: 评论
The Investigation and Prediction of Voriconazole-Associated Hepatotoxicity under Therapeutic Drug Monitoring*
The Investigation and Prediction of Voriconazole-Associated ...
收藏 引用
Annual International Conference of the IEEE engineering in Medicine and Biology Society (EMBC)
作者: Jing Ma Yu Wang Shuang Ma Jingsong Li Research Center for Healthcare Data Science Zhejiang Lab Hangzhou China Engineering Research Center of EMR and Intelligent Expert Systems Ministry of Education Key Laboratory for Biomedical Engineering of Ministry of Education College of Biomedical Engineering and Instrument Science Zhejiang University Hangzhou China
Voriconazole is commonly used as the first-line agent to treat invasive fungal infections (IFIs), but the induction of hepatotoxicity limits its use. To improve the treatment outcomes and minimize toxicity, doctors of...
来源: 评论