咨询与建议

限定检索结果

文献类型

  • 914 篇 期刊文献
  • 659 篇 会议
  • 1 册 图书

馆藏范围

  • 1,574 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,070 篇 工学
    • 766 篇 计算机科学与技术...
    • 653 篇 软件工程
    • 286 篇 信息与通信工程
    • 188 篇 电气工程
    • 153 篇 生物工程
    • 114 篇 控制科学与工程
    • 108 篇 生物医学工程(可授...
    • 101 篇 光学工程
    • 95 篇 电子科学与技术(可...
    • 60 篇 机械工程
    • 50 篇 化学工程与技术
    • 45 篇 交通运输工程
    • 44 篇 仪器科学与技术
    • 35 篇 网络空间安全
    • 30 篇 建筑学
    • 30 篇 安全科学与工程
    • 29 篇 土木工程
  • 580 篇 理学
    • 317 篇 数学
    • 170 篇 生物学
    • 119 篇 物理学
    • 110 篇 统计学(可授理学、...
    • 55 篇 化学
    • 46 篇 系统科学
  • 300 篇 管理学
    • 172 篇 管理科学与工程(可...
    • 141 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 99 篇 医学
    • 90 篇 临床医学
    • 78 篇 基础医学(可授医学...
    • 56 篇 药学(可授医学、理...
  • 42 篇 法学
    • 34 篇 社会学
  • 24 篇 经济学
  • 19 篇 农学
  • 13 篇 教育学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 80 篇 semantics
  • 61 篇 feature extracti...
  • 45 篇 training
  • 43 篇 deep learning
  • 32 篇 computational mo...
  • 32 篇 data models
  • 30 篇 accuracy
  • 28 篇 convolution
  • 28 篇 federated learni...
  • 25 篇 predictive model...
  • 25 篇 machine learning
  • 23 篇 data mining
  • 22 篇 contrastive lear...
  • 21 篇 deep neural netw...
  • 20 篇 image segmentati...
  • 20 篇 neural networks
  • 19 篇 graph neural net...
  • 19 篇 visualization
  • 18 篇 robustness
  • 17 篇 codes

机构

  • 54 篇 shandong provinc...
  • 46 篇 shandong enginee...
  • 44 篇 key laboratory o...
  • 43 篇 college of compu...
  • 41 篇 national enginee...
  • 39 篇 beijing advanced...
  • 37 篇 school of cyber ...
  • 36 篇 college of compu...
  • 35 篇 school of comput...
  • 33 篇 nanyang technolo...
  • 33 篇 university of ch...
  • 28 篇 school of big da...
  • 27 篇 peng cheng labor...
  • 26 篇 hubei key labora...
  • 26 篇 national enginee...
  • 25 篇 hubei engineerin...
  • 24 篇 school of comput...
  • 23 篇 services computi...
  • 23 篇 cluster and grid...
  • 21 篇 college of compu...

作者

  • 68 篇 niyato dusit
  • 30 篇 jin hai
  • 22 篇 sun geng
  • 21 篇 hai jin
  • 19 篇 shen linlin
  • 18 篇 hu shengshan
  • 18 篇 wang jiacheng
  • 17 篇 huang qingming
  • 16 篇 liu ya-feng
  • 16 篇 xu qianqian
  • 15 篇 li jiahui
  • 15 篇 liu bin
  • 14 篇 huang sheng
  • 14 篇 zhang leo yu
  • 13 篇 chen yanping
  • 13 篇 cao xiaochun
  • 13 篇 li minghui
  • 12 篇 yang yang
  • 12 篇 zhou ziqi
  • 12 篇 wang lihui

语言

  • 1,428 篇 英文
  • 125 篇 其他
  • 34 篇 中文
检索条件"机构=The Key Laboratory of Data Engineering and Visual Computing"
1574 条 记 录,以下是161-170 订阅
排序:
MS²-GNN: Exploring GNN-Based Multimodal Fusion Network for Depression Detection
收藏 引用
IEEE transactions on cybernetics 2023年 第12期53卷 7749-7759页
作者: Tao Chen Richang Hong Yanrong Guo Shijie Hao Bin Hu Key Laboratory of Knowledge Engineering with Big Data Ministry of Education and the School of Computer Science and Information Engineering Hefei University of Technology Hefei China Gansu Provincial Key Laboratory of Wearable Computing School of Information Science and Engineering Lanzhou University Lanzhou China
Major depressive disorder (MDD) is one of the most common and severe mental illnesses, posing a huge burden on society and families. Recently, some multimodal methods have been proposed to learn a multimodal embedding... 详细信息
来源: 评论
Visible Light Positioning Method for Indoor Line-of-Sight Scene Based on Time Series Coding  9
Visible Light Positioning Method for Indoor Line-of-Sight Sc...
收藏 引用
9th IEEE International Conference on data Science in Cyberspace, DSC 2024
作者: Yu, Yonghao Guo, Yongde Zhao, Dawei Fu, Kexue Tang, Yongwei Wang, Qinyuan City University of Macau Faculty of Data Science China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Shandong University School of Mechanical Engineering Key Laboratory of High Efficiency and Clean Mechanical Manufacture Ministry of Education Jinan China
Existing indoor visible light positioning methods, such as those based on fingerprint database algorithms, are complex to construct and consume significant resources. In response to this issue, the text proposes an en... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on Software engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
GA-Net: Gated Attention Mechanism Based Global Refinement Network for Image Inpainting  29
GA-Net: Gated Attention Mechanism Based Global Refinement Ne...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Qiu, Ran Zhao, Shengrong Liang, Hu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Underwater images are often affected by problems such as light attenuation, color distortion, noise and scattering, resulting in image defects. A novel image inpainting method is proposed to intelligently predict and ... 详细信息
来源: 评论
Few-Shot Class-Incremental Semantic Segmentation via Pseudo-Labeling and Knowledge Distillation  4
Few-Shot Class-Incremental Semantic Segmentation via Pseudo-...
收藏 引用
4th International Conference on Information Science, Parallel and Distributed Systems, ISPDS 2023
作者: Jiang, Chengjia Wang, Tao Li, Sien Wang, Jinyang Wang, Shirui Antoniou, Antonios Minjiang University Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Fuzhou China Fujian Education Institutions Wuyi University The Key Laboratory of Cognitive Computing and Intelligent Information Processing Wuyishan China College of Computer and Data Science Fuzhou University Fuzhou China European University Cyprus Department of Computer Science and Engineering Nicosia Cyprus
We address the problem of learning new classes for semantic segmentation models from few examples, which is challenging because of the following two reasons. Firstly, it is difficult to learn from limited novel data t... 详细信息
来源: 评论
Oversampling Multi-Label data Based on Natural Neighbor and Label Correlation
SSRN
收藏 引用
SSRN 2023年
作者: Liu, Bin Zhou, Ao Wang, Jin Tsoumakas, Grigorios Key Laboratory of Data Engineering and Visual Computing School of Computer Science of Technology Chongqing University of Posts and Telecommunications Chongqing400065 China School of Informatics Aristotle University of Thessaloniki Thessaloniki54124 Greece
In multi-label learning, addressing the class imbalance issue is of paramount importance. Oversampling methods are preferred as they offer a more general solution independent of the model choice, i.e., they alleviate ... 详细信息
来源: 评论
Multilingual Knowledge Graph Completion via Multimodal Decouple and Relation-based Ensemble Inference  29
Multilingual Knowledge Graph Completion via Multimodal Decou...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Liu, Xiaojing Jiang, Xuesong Yi, Fengge Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
The objective of Multimodal Knowledge Graph Completion (MKGC) is to forecast absent entities within a knowledge graph by leveraging additional textual and visual modalities. Existing studies commonly utilize a singula... 详细信息
来源: 评论
ThyroidNet:A Deep Learning Network for Localization and Classification of Thyroid Nodules
收藏 引用
Computer Modeling in engineering & Sciences 2024年 第4期139卷 361-382页
作者: Lu Chen Huaqiang Chen Zhikai Pan Sheng Xu Guangsheng Lai Shuwen Chen Shuihua Wang Xiaodong Gu Yudong Zhang Ultrasonic Department Zhongda Hospital Affiliated to Southeast UniversityNanjing210009China School of Physics and Information Engineering Jiangsu Second Normal UniversityNanjing211200China School of Computing and Mathematical Sciences University of LeicesterLeicesterLE17RHUK Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia State Key Laboratory of MillimeterWaves Southeast UniversityNanjing210096China Jiangsu Province Engineering Research Center of Basic Education Big Data Application Jiangsu Second Normal UniversityNanjing211200China School of Software Engineering Quanzhou Normal UniversityQuanzhou362000China Department of Biological Sciences Xi’an Jiaotong-Liverpool UniversitySuzhou215123China
Aim:This study aims to establish an artificial intelligence model,ThyroidNet,to diagnose thyroid nodules using deep learning techniques ***:A novel method,ThyroidNet,is introduced and evaluated based on deep learning ... 详细信息
来源: 评论
Differential-Trust-Mechanism Based Trade-off Method Between Privacy and Accuracy in Recommender Systems
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 5054-5068页
作者: Xu, Guangquan Feng, Shicheng Xi, Hao Yan, Qingyang Li, Wenshan Wang, Cong Wang, Wei Liu, Shaoying Tian, Zhihong Zheng, Xi Qingdao Huanghai University School of Big Data Qingdao China Tianjin University College of Intelligence and Computing Tianjin300350 China KLISS and School of Software Beijing100084 China Sichuan University School of Cyber Science and Engineering Chengdu610207 China Xi’an Jiaotong University School of Cyber Science and Engineering Xi’an710049 China East China Normal University Shanghai200062 China Hiroshima University School of Informatics and Data Science Higashihiroshima739-8511 Japan Guangzhou University Cyberspace Institute of Advanced Technology Guangdong Key Laboratory of Industrial Control System Security Huangpu Research School of Guangzhou University China Macquarie University School of Computing SydneyNSW2109 Australia
In the era where Web3.0 values data security and privacy, adopting groundbreaking methods to enhance privacy in recommender systems is crucial. Recommender systems need to balance privacy and accuracy, while also havi... 详细信息
来源: 评论
Effective and Imperceptible Adversarial Textual Attack Via Multi-objectivization
收藏 引用
ACM Transactions on Evolutionary Learning and Optimization 2024年 第3期4卷 1-23页
作者: Liu, Shengcai Lu, Ning Hong, Wenjing Qian, Chao Tang, Ke Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen College of Engineering South Tower 1088 Xueyuan Avenue Guangdong Shenzhen518055 China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong999077 Hong Kong National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen 10F Zhizhen Building Canghai Campus 3688 Nanhai Avenue Guangdong Shenzhen China National Key Laboratory for Novel Software Technology School of Artificial Intelligence Nanjing University Nanjing International College Area Xianlin Campus 163 Xianlin Avenue Jiangsu Nanjing China
The field of adversarial textual attack has significantly grown over the past few years, where the commonly considered objective is to craft adversarial examples (AEs) that can successfully fool the target model. Howe... 详细信息
来源: 评论