咨询与建议

限定检索结果

文献类型

  • 3,624 篇 会议
  • 2,501 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 6,139 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,193 篇 工学
    • 3,207 篇 计算机科学与技术...
    • 2,658 篇 软件工程
    • 760 篇 信息与通信工程
    • 492 篇 控制科学与工程
    • 368 篇 生物工程
    • 315 篇 电气工程
    • 295 篇 机械工程
    • 259 篇 电子科学与技术(可...
    • 214 篇 光学工程
    • 202 篇 生物医学工程(可授...
    • 148 篇 仪器科学与技术
    • 141 篇 化学工程与技术
    • 122 篇 网络空间安全
    • 118 篇 动力工程及工程热...
    • 98 篇 交通运输工程
    • 96 篇 建筑学
    • 95 篇 安全科学与工程
    • 92 篇 材料科学与工程(可...
  • 1,863 篇 理学
    • 1,177 篇 数学
    • 402 篇 生物学
    • 329 篇 统计学(可授理学、...
    • 320 篇 物理学
    • 214 篇 系统科学
    • 149 篇 化学
  • 1,221 篇 管理学
    • 725 篇 管理科学与工程(可...
    • 555 篇 图书情报与档案管...
    • 235 篇 工商管理
  • 132 篇 法学
    • 98 篇 社会学
  • 130 篇 医学
    • 108 篇 临床医学
    • 92 篇 基础医学(可授医学...
  • 74 篇 经济学
  • 68 篇 教育学
  • 45 篇 农学
  • 21 篇 艺术学
  • 15 篇 文学
  • 12 篇 军事学
  • 5 篇 哲学

主题

  • 178 篇 semantics
  • 161 篇 computer science
  • 132 篇 feature extracti...
  • 131 篇 software enginee...
  • 125 篇 laboratories
  • 121 篇 training
  • 112 篇 computational mo...
  • 99 篇 software
  • 97 篇 data mining
  • 97 篇 web services
  • 92 篇 educational inst...
  • 89 篇 deep learning
  • 87 篇 algorithm design...
  • 82 篇 accuracy
  • 80 篇 optimization
  • 78 篇 cloud computing
  • 72 篇 clustering algor...
  • 66 篇 data models
  • 61 篇 authentication
  • 61 篇 wireless sensor ...

机构

  • 456 篇 state key labora...
  • 279 篇 state key labora...
  • 206 篇 school of comput...
  • 179 篇 college of compu...
  • 175 篇 state key labora...
  • 151 篇 state key labora...
  • 144 篇 school of inform...
  • 131 篇 school of electr...
  • 123 篇 key laboratory o...
  • 112 篇 national key lab...
  • 109 篇 state key labora...
  • 107 篇 shanghai key lab...
  • 104 篇 school of comput...
  • 102 篇 school of comput...
  • 90 篇 university of ch...
  • 87 篇 shandong provinc...
  • 77 篇 state key labora...
  • 71 篇 shandong provinc...
  • 65 篇 department of co...
  • 63 篇 school of comput...

作者

  • 73 篇 junping du
  • 55 篇 shen linlin
  • 49 篇 tao dacheng
  • 48 篇 du bo
  • 43 篇 huang di
  • 43 篇 xiao limin
  • 41 篇 gao yang
  • 40 篇 shi yinghuan
  • 35 篇 yu huiqun
  • 34 篇 chen zhong
  • 32 篇 fan guisheng
  • 32 篇 ruan li
  • 31 篇 miao huaikou
  • 31 篇 limin xiao
  • 30 篇 baowen xu
  • 30 篇 zhao jian
  • 30 篇 liu hong
  • 29 篇 shen furao
  • 28 篇 hong mei
  • 27 篇 xu baowen

语言

  • 5,658 篇 英文
  • 328 篇 其他
  • 157 篇 中文
检索条件"机构=The Key Laboratory of Computer Software Engineering"
6139 条 记 录,以下是851-860 订阅
排序:
Tabular insights, visual impacts: transferring expertise from tables to images  24
Tabular insights, visual impacts: transferring expertise fro...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Jun-Peng Jiang Han-Jia Ye Leye Wang Yang Yang Yuan Jiang De-Chuan Zhan School of Artificial Intelligence and National Key Laboratory for Novel Software Technology Nanjing University Nanjing China Key Lab of High Confidence Software Technologies (Peking University) Ministry of Education & School of Computer Science Peking University Beijing China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China
Transferring knowledge across diverse data modalities is receiving increasing attention in machine learning. This paper tackles the task of leveraging expert-derived, yet expensive, tabular data to enhance image-based...
来源: 评论
Uncertainty-Aware Modeling for Improving Prediction of Toxicity  23
Uncertainty-Aware Modeling for Improving Prediction of Toxic...
收藏 引用
23rd International Conference on Machine Learning and Cybernetics, ICMLC 2024
作者: Zhou, Xinlei Wang, Xizhao Zhou, Xinpeng Tu, Siwu Ranwang School of Mathematical Sciences Shenzhen University Shenzhen518060 China College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Shenzhen University Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen518060 China College of Electronic Information Guangxi Minzu University 530000 China Jiangxi Drug Inspection Center Nanchang330001 China
Accurately predicting molecular toxicity is challenging in drug discovery and chemical safety assessment. Except for the representation of molecular structure, the inherent class imbalance and uncertainty often compli... 详细信息
来源: 评论
Deep Learning-Driven Simultaneous Layout Decomposition and Mask Optimization
Deep Learning-Driven Simultaneous Layout Decomposition and M...
收藏 引用
作者: Zhong, Wei Hu, Shuxiang Ma, Yuzhe Yang, Haoyu Ma, Xiuyuan Yu, Bei DUTRU International School of Information Science and Engineering Dalian University of Technology Dalian China Department of Computer Science and Engineering Chinese University of Hong Kong Hong Kong Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province Dalian116024 China
Combining multiple patterning lithography (MPL) and optical proximity correction (OPC) pushes the limit of 193-nm wavelength lithography to go further. Considering that layout decomposition may generate plenty of solu... 详细信息
来源: 评论
A Derivative Matrix-Based Covert Communication Method in Blockchain
收藏 引用
computer Systems Science & engineering 2023年 第7期46卷 225-239页
作者: Xiang Zhang Xiaona Zhang Xiaorui Zhang Wei Sun Ruohan Meng Xingming Sun School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China School of Hydrology and Water Resources Nanjing University of Information Science&TechnologyNanjing210044China Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China Key Laboratory of Hydrometeorological Disaster Mechanism andWarning ofMinistry ofWater Resources Nanjing210044China Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET) NanjingUniversity of Information Science&TechnologyNanjing210044China School of Automation Nanjing University of Information Science&TechnologyNanjing210044China School of Computer Science Engineering Nanyang Technological UniversitySingapore
The data in the blockchain cannot be tampered with and the users are anonymous,which enables the blockchain to be a natural carrier for covert ***,the existing methods of covert communication in blockchain suffer from... 详细信息
来源: 评论
NBMon: NB-IoT-based UAV Network Routing Monitoring System  24
NBMon: NB-IoT-based UAV Network Routing Monitoring System
收藏 引用
24th IEEE International Conference on High Performance Computing and Communications, 8th IEEE International Conference on Data Science and Systems, 20th IEEE International Conference on Smart City and 8th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Application, HPCC/DSS/SmartCity/DependSys 2022
作者: Tang, Ji'ao Zhu, Xiaojun Dong, Chao Zhang, Lei College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics China College of Electronic and Information Engineering Nanjing University of Aeronautics and Astronautics China Nanjing University State Key Laboratory of Novel Software Technology Nanjing China
The routing state of UAV networks is difficult to monitor, making many new routing protocols hard to evaluate on UAVs. In this paper, we propose NBMon, an NB-IoT-based routing monitoring system for UAV networks, which... 详细信息
来源: 评论
ML-based Privacy Leakage Behavior Detection in Android Apps at Scale  19
ML-based Privacy Leakage Behavior Detection in Android Apps ...
收藏 引用
2022 IEEE SmartWorld, 19th IEEE International Conference on Ubiquitous Intelligence and Computing, 2022 IEEE International Conference on Autonomous and Trusted Vehicles Conference, 22nd IEEE International Conference on Scalable Computing and Communications, 2022 IEEE International Conference on Digital Twin, 8th IEEE International Conference on Privacy Computing and 2022 IEEE International Conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: Bu, ZhiLiang Zhao, Chunlei Gong, Liangyi Wang, Yan Yang, Yi Wang, Xi Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Ministry of Education Tianjin China Tianjin University of Technology School of Computer Science and Engineering Tianjin China Computer Network Information Center Chinese Academy of Sciences Beijing China Southeast University School of Cyber Science and Engineering Nanjing China
In recent years, Android application privacy leaking issues frequently occur, with the results that privacy leakage detection becomes a critical role in app market security review, and numerous mobile apps have been r... 详细信息
来源: 评论
High-Fidelity Editable Portrait Synthesis with 3D GAN Inversion
High-Fidelity Editable Portrait Synthesis with 3D GAN Invers...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Jindong Xie Jiachen Liu Yupei Lin Jinbao Wang Xianxu Hou Linlin Shen Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen University School of Information Engineering Guangdong University of Technology Guangzhou China Guangdong Provincial Key Laboratory of Intelligent Information Processing School of AI and Advanced Computing Xi’an Jiaotong-Liverpool University
The 3D generative adversarial network (GAN) inversion converts an image into 3D representation to attain high-fidelity reconstruction and facilitate realistic image manipulation within the 3D latent space. However, pr... 详细信息
来源: 评论
Reasoning about Strategic Abilities in Stochastic Multi-agent Systems
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Yedi Song, Fu Chen, Taolue Wu, Xuzhi Department of Computing Science National University of Singapore Singapore State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences China School of Computing and Mathematical Sciences Birkbeck University of London United Kingdom College of Computer Science and Software Engineering Shenzhen University China
Reasoning about strategic abilities is key to AI systems comprising multiple agents, which provide a unified framework for formalizing various problems in game theory, social choice theory, etc. In this work, we propo... 详细信息
来源: 评论
UR4NNV: Neural Network Verification, Under-approximation Reachability Works!
arXiv
收藏 引用
arXiv 2024年
作者: Liang, Zhen Wu, Taoran Zhao, Ran Xue, Bai Wang, Ji Yang, Wenjing Deng, Shaojun Liu, Wanwei College of Computer Science and Technology National University of Defense Technology China Institute of Software Chinese Academy of Sciences China School of Computer Science and Technology University of Chinese Academy of Sciences China Key Laboratory of Software Engineering for Complex Systems National University of Defense Technology China
Recently, formal verification of deep neural networks (DNNs) has garnered considerable attention, and over-approximation based methods have become popular due to their effectiveness and efficiency. However, these stra... 详细信息
来源: 评论
Mixture of Attention Heads: Selecting Attention Heads Per Token
Mixture of Attention Heads: Selecting Attention Heads Per To...
收藏 引用
2022 Conference on Empirical Methods in Natural Language Processing, EMNLP 2022
作者: Zhang, Xiaofeng Shen, Yikang Huang, Zeyu Zhou, Jie Rong, Wenge Xiong, Zhang State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University China Sino-French Engineer School Beihang University China Mila University of Montreal Canada Wechat AI Tencent China
Mixture-of-Experts (MoE) networks have been proposed as an efficient way to scale up model capacity and implement conditional computing. However, the study of MoE components mostly focused on the feedforward layer in ... 详细信息
来源: 评论