咨询与建议

限定检索结果

文献类型

  • 3,628 篇 会议
  • 2,511 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 6,153 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,208 篇 工学
    • 3,232 篇 计算机科学与技术...
    • 2,643 篇 软件工程
    • 765 篇 信息与通信工程
    • 528 篇 控制科学与工程
    • 366 篇 生物工程
    • 315 篇 电气工程
    • 295 篇 机械工程
    • 262 篇 电子科学与技术(可...
    • 209 篇 光学工程
    • 201 篇 生物医学工程(可授...
    • 148 篇 仪器科学与技术
    • 140 篇 化学工程与技术
    • 124 篇 网络空间安全
    • 117 篇 动力工程及工程热...
    • 100 篇 交通运输工程
    • 95 篇 安全科学与工程
    • 94 篇 建筑学
    • 92 篇 材料科学与工程(可...
  • 1,855 篇 理学
    • 1,173 篇 数学
    • 400 篇 生物学
    • 326 篇 统计学(可授理学、...
    • 319 篇 物理学
    • 214 篇 系统科学
    • 149 篇 化学
  • 1,216 篇 管理学
    • 725 篇 管理科学与工程(可...
    • 550 篇 图书情报与档案管...
    • 232 篇 工商管理
  • 131 篇 法学
    • 97 篇 社会学
  • 131 篇 医学
    • 109 篇 临床医学
    • 92 篇 基础医学(可授医学...
  • 73 篇 经济学
  • 66 篇 教育学
  • 45 篇 农学
  • 21 篇 艺术学
  • 15 篇 文学
  • 12 篇 军事学
  • 5 篇 哲学

主题

  • 180 篇 semantics
  • 161 篇 computer science
  • 135 篇 feature extracti...
  • 131 篇 software enginee...
  • 125 篇 laboratories
  • 123 篇 training
  • 111 篇 computational mo...
  • 99 篇 software
  • 97 篇 data mining
  • 97 篇 web services
  • 92 篇 educational inst...
  • 91 篇 deep learning
  • 87 篇 algorithm design...
  • 83 篇 accuracy
  • 81 篇 optimization
  • 78 篇 cloud computing
  • 74 篇 clustering algor...
  • 65 篇 data models
  • 62 篇 machine learning
  • 61 篇 authentication

机构

  • 458 篇 state key labora...
  • 279 篇 state key labora...
  • 206 篇 school of comput...
  • 178 篇 college of compu...
  • 175 篇 state key labora...
  • 151 篇 state key labora...
  • 144 篇 school of inform...
  • 131 篇 school of electr...
  • 123 篇 key laboratory o...
  • 111 篇 national key lab...
  • 109 篇 state key labora...
  • 108 篇 shanghai key lab...
  • 105 篇 school of comput...
  • 102 篇 school of comput...
  • 90 篇 university of ch...
  • 85 篇 shandong provinc...
  • 76 篇 state key labora...
  • 69 篇 shandong provinc...
  • 65 篇 department of co...
  • 64 篇 school of comput...

作者

  • 73 篇 junping du
  • 55 篇 shen linlin
  • 49 篇 tao dacheng
  • 47 篇 du bo
  • 43 篇 huang di
  • 43 篇 xiao limin
  • 40 篇 gao yang
  • 40 篇 shi yinghuan
  • 35 篇 chen zhong
  • 35 篇 yu huiqun
  • 32 篇 fan guisheng
  • 32 篇 ruan li
  • 31 篇 miao huaikou
  • 31 篇 limin xiao
  • 30 篇 baowen xu
  • 29 篇 zhao jian
  • 29 篇 liu hong
  • 28 篇 shen furao
  • 28 篇 hong mei
  • 27 篇 xu baowen

语言

  • 5,631 篇 英文
  • 369 篇 其他
  • 157 篇 中文
检索条件"机构=The Key Laboratory of Computer Software Engineering"
6153 条 记 录,以下是721-730 订阅
排序:
Sparse and Dense: Learning Confusion Representation Network for 3D Action Recognition
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21240-21254页
作者: Hou, Xinran Geng, Pei Li, Tianchen Li, Yalin Li, Yan Lyu, Lei School of Information Science and Engineering Shandong Normal University Jinan250358 China School of Information Engineering Shandong Management University Jinan250100 China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan250358 China
In the field of the Internet of Medical Things (IoMT), the demand for Human Action Recognition (HAR) is growing. Due to the limitations of portability and privacy of traditional sensors, many endeavors have made signi... 详细信息
来源: 评论
FAER: Fairness-aware Event-participant Recommendation in Event-based Social Networks  22
FAER: Fairness-aware Event-participant Recommendation in Eve...
收藏 引用
Proceedings of the 2022 6th International Conference on computer Science and Artificial Intelligence
作者: Yuan Liang School of Computer Science and Engineering Beihang University China and Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology China
An event-based social network (EBSN) is a new type of social network that combines online and offline networks. In recent years, an important task in EBSN recommendation systems has been to design better and more reas... 详细信息
来源: 评论
DEGSTalk: Decomposed Per-Embedding Gaussian Fields for Hair-Preserving Talking Face Synthesis
arXiv
收藏 引用
arXiv 2024年
作者: Deng, Kaijun Zheng, Dezhi Xie, Jindong Wang, Jinbao Xie, Weicheng Shen, Linlin Song, Siyang Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China Department of Computer Science University of Exeter United Kingdom
Accurately synthesizing talking face videos and capturing fine facial features for individuals with long hair presents a significant challenge. To tackle these challenges in existing methods, we propose a decomposed p... 详细信息
来源: 评论
DPText-DETR: Towards Better Scene Text Detection with Dynamic Points in Transformer  37
DPText-DETR: Towards Better Scene Text Detection with Dynami...
收藏 引用
37th AAAI Conference on Artificial Intelligence, AAAI 2023
作者: Ye, Maoyuan Zhang, Jing Zhao, Shanshan Liu, Juhua Bo, Du Tao, Dacheng Research Center for Graphic Communication Printing and Packaging Institute of Artificial Intelligence Wuhan University China The University of Sydney Australia JD Explore Academy National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence School of Computer Science Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University China
Recently, Transformer-based methods, which predict polygon points or Bezier curve control points for localizing texts, are popular in scene text detection. However, these methods built upon detection transformer frame... 详细信息
来源: 评论
Research on Visual Slam Technology for UAV Positioning and Navigation
Research on Visual Slam Technology for UAV Positioning and N...
收藏 引用
International Conference on Wavelet Active Media Technology and Information Processing (ICWAMTIP)
作者: ZHOU WANG LIU ZHIHAO TIAN YING YANG YUJUN School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China School of Computer and Software Engineering Xihua University Chengdu China Intelligent Policing Key Laboratory of Sichuan Province Sichuan Police College LuZhou China College of Computer and Artificial Intelligence (Software College) Huaihua University Huaihua China
UAV (Unmanned Aerial Vehicle) navigation can be considered as the process of robots that determine how to successfully and quickly reach the target location. Specifically, in order to complete the scheduled task succe... 详细信息
来源: 评论
Causality-Guided Context-Aware Multimodal Public Speaking Anxiety Detection for Out-of-Distribution Generalization
Causality-Guided Context-Aware Multimodal Public Speaking An...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Tingting Zhang Jiachen Tan Zihua Xiong Bin Wu Chunping Zheng Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science (National Pilot Software Engineering School) Beijing University of Posts and Telecommunications Beijing China School of Humanities Beijing University of Posts and Telecommunications Beijing China
Public Speaking Anxiety Detection (PSAD) is a complex and challenging task that involves detecting anxiety through diverse multimodal cues. While deep neural networks have achieved remarkable success in this task, the... 详细信息
来源: 评论
FreqSense: Universal and Low-Latency Adversarial Example Detection for Speaker Recognition with Interpretability in Frequency Domain
FreqSense: Universal and Low-Latency Adversarial Example Det...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yihuan Huang Yuanzhe Li Yanzhen Ren Weiping Tu Yuhong Yang Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University
Speaker recognition (SR) systems are particularly vulnerable to adversarial example (AE) attacks. To mitigate these attacks, AE detection systems are typically integrated into SR systems. To overcome the limitations o... 详细信息
来源: 评论
Inner-approximate Reachability Computation via Zonotopic Boundary Analysis
arXiv
收藏 引用
arXiv 2024年
作者: Ren, Dejin Liang, Zhen Wu, Chenyu Ding, Jianqiang Wu, Taoran Xue, Bai Key Laboratory of System Software Chinese Academy of Sciences State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China College of Computer Science and Technology National University of Defense Technology Changsha China Department of Electrical Engineering and Automation Aalto University Espoo Finland
Inner-approximate reachability analysis involves calculating subsets of reachable sets, known as inner-approximations. This analysis is crucial in the fields of dynamic systems analysis and control theory as it provid... 详细信息
来源: 评论
Ranking Aggregation with Interactive Feedback for Collaborative Person Re-identification  33
Ranking Aggregation with Interactive Feedback for Collaborat...
收藏 引用
33rd British Machine Vision Conference Proceedings, BMVC 2022
作者: Huang, Ji Liang, Chao Zhang, Yue Wang, Zhongyuan Zhang, Chunjie National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan430072 China Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan430072 China Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing Jiaotong University Beijing100044 China
Person re-identification (re-ID) aims to retrieve the same person from a group of networking cameras. Ranking aggregation (RA), a method to aggregates multiple ranking results, can further improve the retrieval accura... 详细信息
来源: 评论
BMDP:Blockchain-Based Multi-Cloud Storage Data Provenance  26
BMDP:Blockchain-Based Multi-Cloud Storage Data Provenance
收藏 引用
26th International Conference on computer Supported Cooperative Work in Design, CSCWD 2023
作者: Wang, Feiyu Zhou, Jian-Tao Guo, Xu Inner Mongolia University College of Computer Science Inner Mongolia Hohhot China Inner Mongolia Key Laboratory of Social Computing and Data Processing Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Engineering Research Center of Ecological Big Data Ministry of Education Natl. Loc. Jt. Eng. Research Center of Intelligent Information Processing Technology for Mongolian Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software China
In a multi-cloud storage system, provenance data records all operations and ownership during its lifecycle, which is critical for data security and audibility. However, recording provenance data also poses some challe... 详细信息
来源: 评论