咨询与建议

限定检索结果

文献类型

  • 631 篇 期刊文献
  • 543 篇 会议
  • 1 册 图书

馆藏范围

  • 1,175 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 825 篇 工学
    • 554 篇 计算机科学与技术...
    • 468 篇 软件工程
    • 195 篇 信息与通信工程
    • 112 篇 生物工程
    • 88 篇 光学工程
    • 77 篇 电气工程
    • 74 篇 化学工程与技术
    • 72 篇 生物医学工程(可授...
    • 70 篇 电子科学与技术(可...
    • 67 篇 控制科学与工程
    • 43 篇 机械工程
    • 29 篇 交通运输工程
    • 27 篇 材料科学与工程(可...
    • 27 篇 建筑学
    • 26 篇 动力工程及工程热...
    • 25 篇 土木工程
    • 23 篇 仪器科学与技术
  • 431 篇 理学
    • 197 篇 数学
    • 126 篇 生物学
    • 118 篇 物理学
    • 62 篇 统计学(可授理学、...
    • 51 篇 化学
    • 24 篇 系统科学
  • 205 篇 管理学
    • 108 篇 管理科学与工程(可...
    • 108 篇 图书情报与档案管...
    • 29 篇 工商管理
  • 57 篇 医学
    • 51 篇 临床医学
    • 38 篇 基础医学(可授医学...
    • 25 篇 药学(可授医学、理...
  • 32 篇 法学
    • 27 篇 社会学
  • 19 篇 农学
  • 16 篇 经济学
  • 11 篇 教育学
  • 3 篇 文学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 38 篇 semantics
  • 31 篇 feature extracti...
  • 23 篇 machine learning
  • 22 篇 training
  • 21 篇 deep learning
  • 20 篇 object detection
  • 19 篇 forecasting
  • 15 篇 deep neural netw...
  • 14 篇 task analysis
  • 12 篇 conferences
  • 12 篇 data mining
  • 12 篇 contrastive lear...
  • 10 篇 neural networks
  • 10 篇 computational mo...
  • 10 篇 classification (...
  • 10 篇 data models
  • 9 篇 optimization
  • 9 篇 graph neural net...
  • 9 篇 benchmarking
  • 9 篇 embeddings

机构

  • 39 篇 school of cyber ...
  • 37 篇 university of ch...
  • 33 篇 school of comput...
  • 27 篇 national enginee...
  • 26 篇 hubei key labora...
  • 26 篇 hubei engineerin...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 22 篇 school of inform...
  • 22 篇 sjtu-pinghu inst...
  • 21 篇 pazhou lab
  • 18 篇 key lab of data ...
  • 18 篇 department of co...
  • 18 篇 school of softwa...
  • 16 篇 fujian provincia...
  • 16 篇 school of inform...
  • 15 篇 state key lab of...
  • 15 篇 research center ...
  • 14 篇 school of softwa...
  • 14 篇 beijing key lab ...

作者

  • 29 篇 jin hai
  • 28 篇 li xirong
  • 22 篇 hai jin
  • 19 篇 zhou linjie
  • 18 篇 chen jianping
  • 18 篇 liu jun
  • 18 篇 hu shengshan
  • 18 篇 lu liangjun
  • 14 篇 zhang leo yu
  • 14 篇 pan jeng-shyang
  • 13 篇 chen hong
  • 13 篇 li minghui
  • 12 篇 li cuiping
  • 12 篇 zhou ziqi
  • 10 篇 jia weijia
  • 10 篇 yang gang
  • 9 篇 li jingbing
  • 9 篇 xue xingsi
  • 9 篇 linjie zhou
  • 9 篇 zhang lingling

语言

  • 1,109 篇 英文
  • 58 篇 其他
  • 8 篇 中文
检索条件"机构=The Key Lab of Data Engineering and Kowledge Engineering"
1175 条 记 录,以下是281-290 订阅
排序:
MVSS-Net: Multi-View Multi-Scale Supervised Networks for Image Manipulation Detection
arXiv
收藏 引用
arXiv 2021年
作者: Dong, Chengbo Chen, Xinru Hu, Ruohan Cao, Juan Li, Xirong The Key Lab of Data Engineering and Kowledge Engineering Renmin University of China Beijing100872 China The AIMC Lab. School of Information Renmin University of China Beijing100872 China Institute of Computing Technology Chinese Academy of Sciences The the Key Laboratory of Media Convergence Production Technology and Systems Beijing100864 China
As manipulating images by copy-move, splicing and/or inpainting may lead to misinterpretation of the visual content, detecting these sorts of manipulations is crucial for media forensics. Given the variety of possible... 详细信息
来源: 评论
Improving Bert Fine-Tuning via Stabilizing Cross-Layer Mutual Information
Improving Bert Fine-Tuning via Stabilizing Cross-Layer Mutua...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Jicun Li Xingjian Li Tianyang Wang Shi Wang Yanan Cao Chengzhong Xu Dejing Dou Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences University of Chinese Academy of Sciences Big Data Lab Baidu Research State Key Lab of IOTSC University of Macau University of Alabama at Birmingham Institute of Information Engineering Chinese Academy of Sciences
Fine-tuning pre-trained language models, such as BERT, has shown enormous success among various NLP tasks. Though simple and effective, the process of fine-tuning has been found unstable, which often leads to unexpect... 详细信息
来源: 评论
SG-NeRF: Neural Surface Reconstruction with Scene Graph Optimization
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Yiyang Dong, Siyan Wang, Xulong Cai, Lulu Zheng, Youyi Yang, Yanchao State Key Lab of CAD&CG Zhejiang University China Chohotech Co. Ltd. Institute of Data Science The University of Hong Kong Hong Kong Department of Electrical and Electronic Engineering The University of Hong Kong Hong Kong
3D surface reconstruction from images is essential for numerous applications. Recently, Neural Radiance Fields (NeRFs) have emerged as a promising framework for 3D modeling. However, NeRFs require accurate camera pose... 详细信息
来源: 评论
Validity Matters: Uncertainty-Guided Testing of Deep Neural Networks
Validity Matters: Uncertainty-Guided Testing of Deep Neural ...
收藏 引用
作者: Jiang, Zhouxian Li, Honghui Wang, Rui Tian, Xuetao Liang, Ci Yan, Fei Zhang, Junwen Liu, Zhen School of Computer Science and Technology Beijing Jiaotong University Beijing China Beijing Key Lab of Traffic Data Analysis and Mining Beijing Jiaotong University Beijing China Collaborative Innovation Center of Railway Traffic Safety Beijing Jiaotong University Beijing China Faculty of Psychology Beijing Normal University Beijing China School of Transportation Science and Engineering Harbin Institute of Technology Harbin China School of Automation and Intelligence Beijing Jiaotong University Beijing China
Despite numerous applications of deep learning technologies on critical tasks in various domains, advanced deep neural networks (DNNs) face persistent safety and security challenges, such as the overconfidence in pred... 详细信息
来源: 评论
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Xiaogeng Li, Minghui Wang, Haoyu Hu, Shengshan Ye, Dengpan Jin, Hai Wu, Libing Xiao, Chaowei School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab China School of Cyber Science and Engineering Wuhan University China Arizona State University United States
Deep neural networks are proven to be vulnerable to backdoor attacks. Detecting the trigger samples during the inference stage, i.e., the test-time trigger sample detection, can prevent the backdoor from being trigger... 详细信息
来源: 评论
KADEL: Knowledge-Aware Denoising Learning for Commit Message Generation
arXiv
收藏 引用
arXiv 2024年
作者: Tao, Wei Zhou, Yucheng Wang, Yanlin Zhang, Hongyu Wang, Haofen Zhang, Wenqiang Shanghai Engineering Research Center of AI and Robotics Academy for Engineering and Technology Fudan University Shanghai China State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science University of Macau China School of Software Engineering Sun Yat-sen University Guangdong Zhuhai519082 China School of Big Data and Software Engineering Chongqing University Chongqing China College of Design and Innovation Tongji University Shanghai China Engineering Research Center of AI and Robotics Ministry of Education Academy for Engineering and Technology Shanghai Key Lab of Intelligent Information Processing School of Computer Science Fudan University 220 Handan Road Shanghai200433 China
Commit messages are natural language descriptions of code changes, which are important for software evolution such as code understanding and maintenance. However, previous methods are trained on the entire dataset wit... 详细信息
来源: 评论
Localization of Image Splicing Under Segment Anything Model With Integrated Compression and Edge Artifacts
Localization of Image Splicing Under Segment Anything Model ...
收藏 引用
IEEE International Conference on Image Processing
作者: Ruhao Zhao Xian Zhong Liang Liao Wenxuan Liu Wenxin Huang Zheng Wang School of Computer Science and Artificial Intelligence Hubei Key Laboratory of Transportation Internet of Things Wuhan University of Technology School of Electrical and Electronic Engineering Rapid-Rich Object Search Lab Nanyang Technological University College of Computing and Data Science Nanyang Technological University School of Computer Science and Information Engineering Hubei University School of Computer Science National Engineering Research Center for Multimedia Software Wuhan University
The localization of image splicing involves identifying pixels in an image that have been spliced from other images, necessitating the discernment of splicing features. Despite significant advancements driven by the r... 详细信息
来源: 评论
A Multi-Step Speed Prediction Method for Traffic Networks Based on MAF-GCN-Seq2Seq Model  2
A Multi-Step Speed Prediction Method for Traffic Networks Ba...
收藏 引用
2nd International Conference on Electronic Information Technology and Smart Agriculture, ICEITSA 2022
作者: Long, Yi Xiao, Hongbo Xiao, Jianhua Peng, Xiaoning School of Computer Science and Engineering Huaihua University Hunan Huaihua418000 China Intelligent Processing and Application in Hunan Province Universities Key Laboratory of Wuling-Mountain Health Big Data Hunan Huaihua418000 China Key Lab. of Intelligent Contr. Technol. for Wuling-Mountain Ecological Agriculture in Hunan Province Hunan Huaihua418000 China
Accurately predicting the future trend of traffic flow is of great significance to the planning of urban traffic. The great challenge of predicting traffic flow stems from the complexity and uncertainty of traffic flo... 详细信息
来源: 评论
Denial-of-Service or Fine-Grained Control: Towards Flexible Model Poisoning Attacks on Federated Learning
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Hangtao Yao, Zeming Zhang, Leo Yu Hu, Shengshan Chen, Chao Liew, Alan Li, Zhetao School of Cyber Science and Engineering Huazhong University of Science and Technology China Swinburne University of Technology Australia Griffith University Australia National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab. Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China RMIT University Australia Xiangtan University China
Federated learning (FL) is vulnerable to poisoning attacks, where adversaries corrupt the global aggregation results and cause denial-of-service (DoS). Unlike recent model poisoning attacks that optimize the amplitude... 详细信息
来源: 评论
Hybrid Parallel Inference for Large Model on Heterogeneous Clusters for High Throughput
Hybrid Parallel Inference for Large Model on Heterogeneous C...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Chaonong Xu Weiming Kong Min Liu Mingming Zhang Chao Li Luqi Gong Beijing Key Lab of Petroleum Data Mining China University of Petroleum (Beijing) Beijing China Institute of Intelligent Computing Zhejiang Lab Hangzhou China School of Computer Science (National Pilot Software Engineering School) BUPT Beijing China
In high-throughput intelligent computing scenarios, multi-device parallelism strategies based on data parallelism or pipeline parallelism have been extensively utilized to accelerate large deep neural network model in...
来源: 评论