咨询与建议

限定检索结果

文献类型

  • 907 篇 期刊文献
  • 659 篇 会议
  • 1 册 图书

馆藏范围

  • 1,567 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,065 篇 工学
    • 762 篇 计算机科学与技术...
    • 650 篇 软件工程
    • 286 篇 信息与通信工程
    • 185 篇 电气工程
    • 153 篇 生物工程
    • 114 篇 控制科学与工程
    • 108 篇 生物医学工程(可授...
    • 101 篇 光学工程
    • 95 篇 电子科学与技术(可...
    • 60 篇 机械工程
    • 50 篇 化学工程与技术
    • 45 篇 交通运输工程
    • 44 篇 仪器科学与技术
    • 35 篇 网络空间安全
    • 30 篇 建筑学
    • 30 篇 安全科学与工程
    • 29 篇 土木工程
  • 579 篇 理学
    • 315 篇 数学
    • 170 篇 生物学
    • 119 篇 物理学
    • 108 篇 统计学(可授理学、...
    • 55 篇 化学
    • 46 篇 系统科学
  • 298 篇 管理学
    • 171 篇 管理科学与工程(可...
    • 140 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 99 篇 医学
    • 90 篇 临床医学
    • 78 篇 基础医学(可授医学...
    • 56 篇 药学(可授医学、理...
  • 41 篇 法学
    • 34 篇 社会学
  • 23 篇 经济学
  • 19 篇 农学
  • 13 篇 教育学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 80 篇 semantics
  • 61 篇 feature extracti...
  • 45 篇 training
  • 43 篇 deep learning
  • 32 篇 computational mo...
  • 32 篇 data models
  • 30 篇 accuracy
  • 28 篇 convolution
  • 28 篇 federated learni...
  • 25 篇 predictive model...
  • 25 篇 machine learning
  • 23 篇 data mining
  • 22 篇 contrastive lear...
  • 21 篇 deep neural netw...
  • 20 篇 image segmentati...
  • 20 篇 neural networks
  • 19 篇 graph neural net...
  • 19 篇 visualization
  • 18 篇 robustness
  • 17 篇 codes

机构

  • 54 篇 shandong provinc...
  • 46 篇 shandong enginee...
  • 44 篇 key laboratory o...
  • 43 篇 college of compu...
  • 41 篇 national enginee...
  • 39 篇 beijing advanced...
  • 37 篇 school of cyber ...
  • 36 篇 college of compu...
  • 35 篇 school of comput...
  • 33 篇 nanyang technolo...
  • 33 篇 university of ch...
  • 28 篇 school of big da...
  • 27 篇 peng cheng labor...
  • 26 篇 hubei key labora...
  • 26 篇 national enginee...
  • 25 篇 hubei engineerin...
  • 24 篇 school of comput...
  • 23 篇 services computi...
  • 23 篇 cluster and grid...
  • 21 篇 college of compu...

作者

  • 68 篇 niyato dusit
  • 30 篇 jin hai
  • 22 篇 sun geng
  • 21 篇 hai jin
  • 19 篇 shen linlin
  • 18 篇 hu shengshan
  • 18 篇 wang jiacheng
  • 17 篇 huang qingming
  • 16 篇 liu ya-feng
  • 16 篇 xu qianqian
  • 15 篇 li jiahui
  • 15 篇 liu bin
  • 14 篇 huang sheng
  • 14 篇 zhang leo yu
  • 13 篇 cao xiaochun
  • 13 篇 li minghui
  • 12 篇 yang yang
  • 12 篇 zhou ziqi
  • 12 篇 wang lihui
  • 12 篇 mingzhe chen

语言

  • 1,420 篇 英文
  • 125 篇 其他
  • 35 篇 中文
检索条件"机构=The Key Laboratory of Data Engineering and Visual Computing"
1567 条 记 录,以下是101-110 订阅
排序:
REQUIRED NUMBER OF ITERATIONS FOR SPARSE SIGNAL RECOVERY VIA ORTHOGONAL LEAST SQUARES
收藏 引用
Journal of Computational Mathematics 2023年 第1期41卷 1-17页
作者: Haifeng Li Jing Zhang Jinming Wen Dongfang Li Henan Engineering Laboratory for Big Data Statistical Analysis and Optimal Control College of Mathematics and Information ScienceHenan Normal UniversityXinxiang 453007China College of Information Science and Technology Jinan UniversityGuangzhou 510632China School of Mathematics and Statistics Huazhong University of Science and TechnologyWuhan 430074China Hubei Key Laboratory of Engineering Modeling and Scientific Computing Huazhong University of Science and TechnologyWuhan 430074China
In countless applications,we need to reconstruct a K-sparse signal x∈R n from noisy measurements y=Φx+v,whereΦ∈R^(m×n)is a sensing matrix and v∈R m is a noise *** least squares(OLS),which selects at each ste... 详细信息
来源: 评论
A Two Dimensional Feature engineering Method for Relation Extraction  5
A Two Dimensional Feature Engineering Method for Relation Ex...
收藏 引用
5th International Conference on Control, Robotics, and Intelligent System, CCRIS 2024
作者: Wang, Hao Chen, Yanping Yang, Weizhe Lin, Chuan Text Computing & Cognitive Intelligence Engineering Research Center of National Education Ministry Huaxi District Guizhou China State Key Laboratory of Public Big Data Huaxi District Guizhou China Guizhou University Huaxi District Guizhou China
Transforming a sentence into a 2D representation, similar to table structures, reveals a semantic plane where elements can represent potential relations between paired entities. The 2D representation effectively addre... 详细信息
来源: 评论
Last-X-Generation Archiving Strategy for Multi-Objective Evolutionary Algorithms  13
Last-X-Generation Archiving Strategy for Multi-Objective Evo...
收藏 引用
13th IEEE Congress on Evolutionary Computation, CEC 2024
作者: Shu, Tianye Nan, Yang Shang, Ke Ishibuchi, Hisao Southern University of Science and Technology Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation Department of Computer Science and Engineering Shenzhen518055 China Southern University of Science and Technology Shenzhen518055 China Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen518060 China
For evolutionary multi-objective optimization algorithms (EMOAs), an external archive can be utilized for saving good solutions found throughout the evolutionary process. Recent studies showed that a solution set sele... 详细信息
来源: 评论
Feature Rotation Invariance Learning for Point Cloud Analysis  10
Feature Rotation Invariance Learning for Point Cloud Analysi...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Shi, Lu Cao, Qi Zhang, Guoqing Yi, Jin Huang, Yansen Cen, Yigang Beijing Jiaotong University State Key Laboratory of Advanced Rail Autonomous Operation The School of Computer Science and Technology Visual Intellgence +X International Cooperation Joint Laboratory of Moe Beijing100044 China University of Glasgow The School of Computing Science 567739 Singapore Beijing Jiaotong University With the Key Laboratory of Big Data & Artificial Intelligence in Transportation Ministry of Education The State Key Laboratory of Advanced Rail Autonomous Operation The School of Computer and Information Technology Beijing100044 China Guizhou University Guizhou Lianjian Civil Engineering Quality Testing Monitoring Center Co. Ltd The College of Civil Engineering Guizhou550025 China
While deep learning has significantly advanced point cloud analysis, extracting effective features from their disordered structure remains challenging. Existing approaches often rely on complex network architectures o... 详细信息
来源: 评论
Towards Stricter Black-box Integrity Verification of Deep Neural Network Models  24
Towards Stricter Black-box Integrity Verification of Deep Ne...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: He, Chaoxiang Bai, Xiaofan Ma, Xiaojing Zhu, Bin B. Hu, Pingyi Fu, Jiayun Jin, Hai Zhang, Dongmei Huazhong University of Science and Technology Hubei Wuhan China Shanghai Jiao Tong University Shanghai China Microsoft Corporation Beijing China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China
Cloud-based machine learning services offer significant advantages but also introduce the risk of tampering with cloud-deployed deep neural network (DNN) models. Black-box integrity verification (BIV) allows model own... 详细信息
来源: 评论
Improved Capon Estimator for High-Resolution DOA Estimation and Its Statistical Analysis
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第8期10卷 1716-1729页
作者: Weiliang Zuo Jingmin Xin Changnong Liu Nanning Zheng Akira Sano IEEE the National Key Laboratory of Human-Machine Hybrid Augmented Intelligence the National Engineering Research Center for Visual Information and Applicationsand the Institute of Artificial Intelligence and RoboticsXi’an Jiaotong UniversityXi’an 710049China the Data Center China Construction BankBeijing 100033China the Department of System Design Engineering Keio UniversityYokohama 223-8522Japan
Despite some efforts and attempts have been made to improve the direction-of-arrival(DOA)estimation performance of the standard Capon beamformer(SCB)in array processing,rigorous statistical performance analyses of the... 详细信息
来源: 评论
Intersecting-Boundary-Sensitive Fingerprinting for Tampering Detection of DNN Models  41
Intersecting-Boundary-Sensitive Fingerprinting for Tampering...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Bai, Xiaofan He, Chaoxiang Ma, Xiaojing Zhu, Bin Benjamin Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Microsoft United States School of Computer Science and Technology Huazhong University of Science and Technology China Cluster and Grid Computing Lab China
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr... 详细信息
来源: 评论
4D foetal cardiac ultrasound image detection based on deep learning with weakly supervised localisation for rapid diagnosis of evolving hypoplastic left heart syndrome
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第6期9卷 1485-1499页
作者: Gang Wang Weisheng Li Mingliang Zhou Haobo Zhu Guang Yang Choon Hwai Yap Chongqing Key Laborotory of Image Rocognition Chongqing University of Posts and TelecommunicationsChongqingChina School of Computing and Data Engineering NingboTech UniversityNingboChina Department of Bioengineering Imperial College LondonLondonUK Key Laboratory of Cyberspace Big Data Intelligent Security(Chongqing University of Posts and Telecommunications) Ministry of EducationChongqingChina School of Computer Science Chongqing UniversityChongqingChina University of Oxford OxfordUK Cardiovascular Research Centre Royal Brompton HospitalLondonUK National Heart and Lung Institute Imperial College LondonLondonUK
Hypoplastic left heart syndrome(HLHS)is a rare,complex,and incredibly foetal congenital heart *** decrease neonatal mortality,evolving HLHS(eHLHS)in pregnant women should be critically diagnosed as soon as ***,diagnos... 详细信息
来源: 评论
Asymmetric scattering behaviors of spin wave dependent on magnetic vortex chirality
收藏 引用
Chinese Physics B 2023年 第10期32卷 635-640页
作者: 张雪枫 沈帝虎 马晓萍 宋成 于海明 朴红光 Hubei Engineering Research Center of Weak Magnetic-Field Detection China Three Gorges UniversityYichang 443002China Department of Physics College of ScienceYanbian UniversityYanji 133002China Key Laboratory of Advanced Materials(MOE) School of Materials Science and EngineeringTsinghua UniversityBeijing 100084China Fert Beijing Institute School of Integrated Circuit Science and EngineeringBeijing Advanced Innovation Center for Big Data and Brain ComputingBeihang UniversityBeijing 100191China
We investigate asymmetric spin wave scattering behaviors caused by vortex chirality in a cross-shaped ferromagnetic system by using the micromagnetic *** the system,four scattering behaviors are found:(i)asymmetric sk... 详细信息
来源: 评论
Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need  38
Unlearnable 3D Point Clouds: Class-wise Transformation Is Al...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Wang, Xianlong Li, Minghui Liu, Wei Zhang, Hangtao Hu, Shengshan Zhang, Yechao Zhou, Ziqi Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论