咨询与建议

限定检索结果

文献类型

  • 631 篇 期刊文献
  • 543 篇 会议
  • 1 册 图书

馆藏范围

  • 1,175 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 825 篇 工学
    • 554 篇 计算机科学与技术...
    • 468 篇 软件工程
    • 195 篇 信息与通信工程
    • 112 篇 生物工程
    • 88 篇 光学工程
    • 77 篇 电气工程
    • 74 篇 化学工程与技术
    • 72 篇 生物医学工程(可授...
    • 70 篇 电子科学与技术(可...
    • 67 篇 控制科学与工程
    • 43 篇 机械工程
    • 29 篇 交通运输工程
    • 27 篇 材料科学与工程(可...
    • 27 篇 建筑学
    • 26 篇 动力工程及工程热...
    • 25 篇 土木工程
    • 23 篇 仪器科学与技术
  • 431 篇 理学
    • 197 篇 数学
    • 126 篇 生物学
    • 118 篇 物理学
    • 62 篇 统计学(可授理学、...
    • 51 篇 化学
    • 24 篇 系统科学
  • 205 篇 管理学
    • 108 篇 管理科学与工程(可...
    • 108 篇 图书情报与档案管...
    • 29 篇 工商管理
  • 57 篇 医学
    • 51 篇 临床医学
    • 38 篇 基础医学(可授医学...
    • 25 篇 药学(可授医学、理...
  • 32 篇 法学
    • 27 篇 社会学
  • 19 篇 农学
  • 16 篇 经济学
  • 11 篇 教育学
  • 3 篇 文学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 38 篇 semantics
  • 31 篇 feature extracti...
  • 23 篇 machine learning
  • 22 篇 training
  • 21 篇 deep learning
  • 20 篇 object detection
  • 19 篇 forecasting
  • 15 篇 deep neural netw...
  • 14 篇 task analysis
  • 12 篇 conferences
  • 12 篇 data mining
  • 12 篇 contrastive lear...
  • 10 篇 neural networks
  • 10 篇 computational mo...
  • 10 篇 classification (...
  • 10 篇 data models
  • 9 篇 optimization
  • 9 篇 graph neural net...
  • 9 篇 benchmarking
  • 9 篇 embeddings

机构

  • 39 篇 school of cyber ...
  • 37 篇 university of ch...
  • 33 篇 school of comput...
  • 27 篇 national enginee...
  • 26 篇 hubei key labora...
  • 26 篇 hubei engineerin...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 22 篇 school of inform...
  • 22 篇 sjtu-pinghu inst...
  • 21 篇 pazhou lab
  • 18 篇 key lab of data ...
  • 18 篇 department of co...
  • 18 篇 school of softwa...
  • 16 篇 fujian provincia...
  • 16 篇 school of inform...
  • 15 篇 state key lab of...
  • 15 篇 research center ...
  • 14 篇 school of softwa...
  • 14 篇 beijing key lab ...

作者

  • 29 篇 jin hai
  • 28 篇 li xirong
  • 22 篇 hai jin
  • 19 篇 zhou linjie
  • 18 篇 chen jianping
  • 18 篇 liu jun
  • 18 篇 hu shengshan
  • 18 篇 lu liangjun
  • 14 篇 zhang leo yu
  • 14 篇 pan jeng-shyang
  • 13 篇 chen hong
  • 13 篇 li minghui
  • 12 篇 li cuiping
  • 12 篇 zhou ziqi
  • 10 篇 jia weijia
  • 10 篇 yang gang
  • 9 篇 li jingbing
  • 9 篇 xue xingsi
  • 9 篇 linjie zhou
  • 9 篇 zhang lingling

语言

  • 1,109 篇 英文
  • 58 篇 其他
  • 8 篇 中文
检索条件"机构=The Key Lab of Data Engineering and Kowledge Engineering"
1175 条 记 录,以下是241-250 订阅
排序:
Robust Cross-Domain Speaker Verification with Multi-Level Domain Adapters
Robust Cross-Domain Speaker Verification with Multi-Level Do...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Wen Huang Bing Han Shuai Wang Zhengyang Chen Yanmin Qian AI Institute Department of Computer Science and Engineering Auditory Cognition and Computational Acoustics Lab MoE Key Lab of Artificial Intelligence Shanghai Jiao Tong University Shanghai China Shenzhen Research Institute of Big Data The Chinese University of Hong Kong Shenzhen China
Speaker verification encounters significant challenges when confronted with diverse domain data, often resulting in performance degradation due to domain mismatch. To enhance performance in cross-domain scenarios, we ...
来源: 评论
A Survey of Integrating Generative Artificial Intelligence and 6G Mobile Services: Architectures, Solutions, Technologies and Outlooks
收藏 引用
IEEE Transactions on Cognitive Communications and Networking 2025年
作者: Liu, Yi-Jing Du, Hongyang Xu, Xinyi Zhang, Ruichen Feng, Gang Cao, Bin Niyato, Dusit Kim, Dong In Jamalipour, Abbas Letaief, Khaled B. Tafazolli, Rahim University of Electronic Science and Technology of China National Key Lab on Wireless Communications Chengdu China University of Hong Kong Department of Electrical and Electronic Engineering Pok Fu Lam Hong Kong Nanyang Technological University College of Computing and Data Science Singapore Singapore Beijing University of Posts and Telecommunications State Key Laboratory of Networking and Switching Technology Beijing China Sungkyunkwan University Department of Electrical and Computer Engineering Suwon Korea Republic of University of Sydney School of Electrical and Computer Engineering Sydney Australia Hong Kong University of Science and Technology Department of Electronic and Computer Engineering Hong Kong Hong Kong University of Surrey Institute for Communication Systems School of Computer Science and Electronic Engineering United Kingdom
Generative artificial intelligence (GenAI) is rapidly driving a new phase of artificial intelligence revolution, marked by various applications such as ChatGPT, Sora and DeepSeek. With powerful capabilities in content... 详细信息
来源: 评论
Unsupervised Multi-shot Person Re-identification via Dynamic Bi-directional Normalized Sparse Representation  27th
Unsupervised Multi-shot Person Re-identification via Dynamic...
收藏 引用
27th International Conference on MultiMedia Modeling, MMM 2021
作者: Li, Xiaobao Wang, Wen Li, Qingyong Guo, Lijun Beijing Key Lab of Traffic Data Analysis and Mining Beijing Jiaotong University Beijing China Faculty of Electrical Engineering and Computer Science Ningbo University Ningbo Zhejiang China
Due to the abundant priori information and the widespread applications, multi-shot based person re-identification has drawn increasing attention in recent years. In this paper, the high labeling cost and the huge unla... 详细信息
来源: 评论
SP3: Enhancing Structured Pruning via PCA Projection
arXiv
收藏 引用
arXiv 2023年
作者: Hu, Yuxuan Zhang, Jing Zhao, Zhe Zhao, Chen Chen, Xiaodong Li, Cuiping Chen, Hong School of Information Renmin University of China Beijing China Key Laboratory of Data Engineering and Knowledge Engineering MOE China Engineering Research Center of Database and Business Intelligence MOE China Tencent AI Lab Tencent Beijing China School of Computer Science and Technology Xi'an Jiaotong University Xi'An China
Structured pruning is a widely used technique for reducing the size of pre-trained language models (PLMs), but current methods often overlook the potential of compressing the hidden dimension (d) in PLMs, a dimension ...
来源: 评论
Detector Collapse: Physical-World Backdooring Object Detection to Catastrophic Overload or Blindness in Autonomous Driving
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Hangtao Hu, Shengshan Wang, Yichen Zhang, Leo Yu Zhou, Ziqi Wang, Xianlong Zhang, Yanjun Chen, Chao School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Cluster and Grid Computing Lab China School of Information and Communication Technology Griffith University Australia University of Technology Sydney Australia RMIT University Australia
Object detection tasks, crucial in safety-critical systems like autonomous driving, focus on pinpointing object locations. These detectors are known to be susceptible to backdoor attacks. However, existing backdoor te... 详细信息
来源: 评论
Prototype and Instance Contrastive Learning for Unsupervised Domain Adaptation in Speaker Verification
arXiv
收藏 引用
arXiv 2024年
作者: Huang, Wen Han, Bing Chen, Zhengyang Wang, Shuai Qian, Yanmin Auditory Cognition and Computational Acoustics Lab MoE Key Lab of Artificial Intelligence AI Institute Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China Shenzhen Research Institute of Big Data The Chinese University of Hong Kong Shenzhen China
Speaker verification system trained on one domain usually suffers performance degradation when applied to another domain. To address this challenge, researchers commonly use feature distribution matching-based methods... 详细信息
来源: 评论
ECLIPSE: Expunging Clean-label Indiscriminate Poisons via Sparse Diffusion Purification
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Xianlong Hu, Shengshan Zhang, Yechao Zhou, Ziqi Zhang, Leo Yu Xu, Peng Wan, Wei Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Information and Communication Technology Griffith University SouthportQLD4215 Australia
Clean-label indiscriminate poisoning attacks add invisible perturbations to correctly labeled training images, thus dramatically reducing the generalization capability of the victim models. Recently, defense mechanism... 详细信息
来源: 评论
An RTDNN-Based Hybrid Precoding and Combining Joint Optimization Algorithm for MUPC-MIMO Systems
IEEE Transactions on Green Communications and Networking
收藏 引用
IEEE Transactions on Green Communications and Networking 2025年
作者: Liu, Fulai Liu, Yubiao Yang, Xianghuan Duan, Zhuoyao Shi, Baozhu Ji, Li Du, Ruiyan Northeastern University at Qinhuangdao Lab of Key Technology of Millimeter-wave Large-scale MIMO System Hebei Key Laboratory of Marine Perception Network and Data Processing Qinhuangdao066004 China Hebei University College of Mathematics and Information Science Baoding071002 China Northeastern University School of Computer Science and Engineering Shenyang110819 China Qinhuangdao Vocational and Technical College Qinhuangdao066100 China School of Computer Science and Engineering Northeastern University Shenyang110004 China
To achieve a satisfactory balance between energy efficiency (EE) and spectral efficiency (SE) for hybrid precoding and combining (HPC), this paper presents a two-stage joint optimization HPC algorithm based on residua... 详细信息
来源: 评论
Semantic-Constraint Matching Transformer for Weakly Supervised Object Localization
arXiv
收藏 引用
arXiv 2023年
作者: Cao, Yiwen Su, Yukun Wang, Wenjun Liu, Yanxia Wu, Qingyao The School of Software Engineering South China University of Technology Guangzhou510640 China The Key Laboratory of Big Data and Intelligent Robot Ministry of Education Guangzhou China The School of Computer Science and Engineering Nanyang Technological University Singapore The Pazhou Lab Guangzhou China
Weakly supervised object localization (WSOL) strives to learn to localize objects with only image-level supervision. Due to the local receptive fields generated by convolution operations, previous CNN-based methods su... 详细信息
来源: 评论
PS3: Precise Patch Presence Test based on Semantic Symbolic Signature
arXiv
收藏 引用
arXiv 2023年
作者: Zhan, Qi Xia, Xin Hu, Xing Lo, David Li, Zhiyang Li, Shanping The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Software Engineering Application Technology Lab China Singapore Management University Singapore Zhejiang University Hangzhou China
During software development, vulnerabilities have posed a significant threat to users. Patches are the most effective way to combat vulnerabilities. In a large-scale software system, testing the presence of a security... 详细信息
来源: 评论