咨询与建议

限定检索结果

文献类型

  • 3,628 篇 会议
  • 2,511 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 6,153 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,208 篇 工学
    • 3,232 篇 计算机科学与技术...
    • 2,643 篇 软件工程
    • 765 篇 信息与通信工程
    • 528 篇 控制科学与工程
    • 366 篇 生物工程
    • 315 篇 电气工程
    • 295 篇 机械工程
    • 262 篇 电子科学与技术(可...
    • 209 篇 光学工程
    • 201 篇 生物医学工程(可授...
    • 148 篇 仪器科学与技术
    • 140 篇 化学工程与技术
    • 124 篇 网络空间安全
    • 117 篇 动力工程及工程热...
    • 100 篇 交通运输工程
    • 95 篇 安全科学与工程
    • 94 篇 建筑学
    • 92 篇 材料科学与工程(可...
  • 1,855 篇 理学
    • 1,173 篇 数学
    • 400 篇 生物学
    • 326 篇 统计学(可授理学、...
    • 319 篇 物理学
    • 214 篇 系统科学
    • 149 篇 化学
  • 1,216 篇 管理学
    • 725 篇 管理科学与工程(可...
    • 550 篇 图书情报与档案管...
    • 232 篇 工商管理
  • 131 篇 法学
    • 97 篇 社会学
  • 131 篇 医学
    • 109 篇 临床医学
    • 92 篇 基础医学(可授医学...
  • 73 篇 经济学
  • 66 篇 教育学
  • 45 篇 农学
  • 21 篇 艺术学
  • 15 篇 文学
  • 12 篇 军事学
  • 5 篇 哲学

主题

  • 180 篇 semantics
  • 161 篇 computer science
  • 135 篇 feature extracti...
  • 131 篇 software enginee...
  • 125 篇 laboratories
  • 123 篇 training
  • 111 篇 computational mo...
  • 99 篇 software
  • 97 篇 data mining
  • 97 篇 web services
  • 92 篇 educational inst...
  • 91 篇 deep learning
  • 87 篇 algorithm design...
  • 83 篇 accuracy
  • 81 篇 optimization
  • 78 篇 cloud computing
  • 74 篇 clustering algor...
  • 65 篇 data models
  • 62 篇 machine learning
  • 61 篇 authentication

机构

  • 458 篇 state key labora...
  • 279 篇 state key labora...
  • 206 篇 school of comput...
  • 178 篇 college of compu...
  • 175 篇 state key labora...
  • 151 篇 state key labora...
  • 144 篇 school of inform...
  • 131 篇 school of electr...
  • 123 篇 key laboratory o...
  • 111 篇 national key lab...
  • 109 篇 state key labora...
  • 108 篇 shanghai key lab...
  • 105 篇 school of comput...
  • 102 篇 school of comput...
  • 90 篇 university of ch...
  • 85 篇 shandong provinc...
  • 76 篇 state key labora...
  • 69 篇 shandong provinc...
  • 65 篇 department of co...
  • 64 篇 school of comput...

作者

  • 73 篇 junping du
  • 55 篇 shen linlin
  • 49 篇 tao dacheng
  • 47 篇 du bo
  • 43 篇 huang di
  • 43 篇 xiao limin
  • 40 篇 gao yang
  • 40 篇 shi yinghuan
  • 35 篇 chen zhong
  • 35 篇 yu huiqun
  • 32 篇 fan guisheng
  • 32 篇 ruan li
  • 31 篇 miao huaikou
  • 31 篇 limin xiao
  • 30 篇 baowen xu
  • 29 篇 zhao jian
  • 29 篇 liu hong
  • 28 篇 shen furao
  • 28 篇 hong mei
  • 27 篇 xu baowen

语言

  • 5,631 篇 英文
  • 369 篇 其他
  • 157 篇 中文
检索条件"机构=The Key Laboratory of Computer Software Engineering"
6153 条 记 录,以下是641-650 订阅
排序:
GRAVMAD: GROUNDED SPATIAL VALUE MAPS GUIDED ACTION DIFFUSION FOR GENERALIZED 3D MANIPULATION
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Yangtao Chen, Zixuan Yin, Junhui Huo, Jing Tian, Pinzhuo Shi, Jieqi Gao, Yang State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Suzhou China School of Computer Engineering and Science Shanghai University Shanghai China
Robots’ ability to follow language instructions and execute diverse 3D manipulation tasks is vital in robot learning. Traditional imitation learning-based methods perform well on seen tasks but struggle with novel, u... 详细信息
来源: 评论
Tkstagnet: A Top-K Spatio-Temporal Attention Gating Network for Air Pollution Prediction
SSRN
收藏 引用
SSRN 2024年
作者: Zhou, Hongliang Mao, Yingchi Li, Xiang Rong, Yi Chen, Ling Yin, Changkui College of Computer Science and Software Engineering Hohai University Nanjing China Key Laboratory of Water Big Data Technology of Ministry of Water Resources Nanjing China
Accurate air pollution prediction is of great significance for human health, travel and environmental management. As an emerging artificial intelligence technology, Transformer has already shown tremendous potential i... 详细信息
来源: 评论
HyperDiff: Masked Diffusion Model with High-efficient Transformer for Hyperspectral Image Cross-Scene Classification
HyperDiff: Masked Diffusion Model with High-efficient Transf...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Zhang, Pei Wang, Dong Wu, Chanyue Yang, Jing Kang, Lei Bai, Zongwen Li, Ying Shen, Qiang School of Computer Science Northwestern Polytechnical University Xi'an China Shaanxi Key Laboratory of Intelligent Processing for Big Energy Data Yan'an University Yan'an China School of Automation and Software Engineering Shanxi University Taiyuan China Qingdao Topscomm Communication Co. Ltd. Qingdao China Department of Computer Science Aberystwyth University Aberystwyth United Kingdom
Hyperspectral Image (HSI) cross-scene classification is a challenging task in remote sensing, particularly when real-time processing of Target Domain (TD) HSI is required, and data cannot be reused for training. While... 详细信息
来源: 评论
A Crowdsourcing Digital Forensics Platform for IoT Environments Powered by Blockchain
A Crowdsourcing Digital Forensics Platform for IoT Environme...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Yaqing Zhang Xiao Fu Bin Luo Xiaojiang Du State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Electrical and Computer Engineering Stevens Institute of Technology Hoboken NJ USA
Digital forensics is a security research field that has evolved with the advancement of digital technologies, such as computer and network technology. With the emergence of complex forensic environments, such as those... 详细信息
来源: 评论
A theoretical analysis of backdoor poisoning attacks in convolutional neural networks  24
A theoretical analysis of backdoor poisoning attacks in conv...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Boqi Li Weiwei Liu School of Computer Science National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence and Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan China
The rising threat of backdoor poisoning attacks (BPAs) on Deep Neural Networks (DNNs) has become a significant concern in recent years. In such attacks, the adversaries strategically target a specific class and genera...
来源: 评论
Expression-Aware Masking and Progressive Decoupling for Cross-Database Facial Expression Recognition
Expression-Aware Masking and Progressive Decoupling for Cros...
收藏 引用
International Conference on Automatic Face and Gesture Recognition
作者: Tao Zhong Xiaole Xian Zihan Wang Weicheng Xie Linlin Shen Computer Vision Institute School of Computer Science & Software Engineering Shenzhen University Shenzhen Institute of Artificial Intelligence and Robotics for Society Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University
Cross-database facial expression recognition (CD-FER) has been widely studied due to its promising applicability in real-life situations, while the generalization performance is the main concern in this task. For impr... 详细信息
来源: 评论
Reconfigurable Intelligent Surface-Aided Covert Communications: A Multi-User Scenario
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Hu, Xiaoyan Zhao, Pengze Xiao, Han Zheng, Tong-Xing Wang, Wenjie Yang, Kun Xi'an Jiaotong University School of Information and Communications Engineering Xi'an710049 China Southeast University National Mobile Communications Research Laboratory Nanjing210096 China Nanjing University State Key Laboratory of Novel Software Technology Nanjing210008 China School of Intelligent Software and Engineering Suzhou215163 China University of Essex School of Computer Science and Electronic Engineering United Kingdom
This paper explores a multi-user covert communication scenario with the assistance of a reconfigurable intelligent surface (RIS). Except a covert user monitored by the warden, there are multiple public users existing ... 详细信息
来源: 评论
Sequential Kernel Goodness-of-fit testing  24
Sequential Kernel Goodness-of-fit testing
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Zhengyu Zhou Weiwei Liu School of Computer Science National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence and Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan China
Goodness-of-fit testing, a classical statistical tool, has been extensively explored in the batch setting, where the sample size is predetermined. However, practitioners often prefer methods that adapt to the complexi...
来源: 评论
Lifeline Consensus: Protect Small-scale Blockchain From Typical Attacks
Lifeline Consensus: Protect Small-scale Blockchain From Typi...
收藏 引用
International Wireless Communications and Mobile Computing Conference, IWCMC
作者: Kundu Chen Jie Luo State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Haidian District Beijing China
Blockchain is a distributed network system known for its anonymity, security, and decentralized nature. While blockchains with robust networks such as Bitcoin and Ethereum are proving immutable to attacks, many others...
来源: 评论
Handover Scheme in LEO Satellite Networks Based on QoE for Streaming Services
Handover Scheme in LEO Satellite Networks Based on QoE for S...
收藏 引用
International Conference on Communication Technology (ICCT)
作者: Huazhi Feng Lidong Zhu Jianhong Zhou National Key Laboratory of Wireless Communications University of Electronic Science and Technology of China Chengdu China School of Computer and Software Engineering Xihua University Chengdu China
The development of satellite communications has received considerable attention in recent years. Early satellite communications were dominated by voice and low-speed data services, but now they must support high-speed... 详细信息
来源: 评论