咨询与建议

限定检索结果

文献类型

  • 914 篇 期刊文献
  • 659 篇 会议
  • 1 册 图书

馆藏范围

  • 1,574 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,070 篇 工学
    • 766 篇 计算机科学与技术...
    • 653 篇 软件工程
    • 286 篇 信息与通信工程
    • 188 篇 电气工程
    • 153 篇 生物工程
    • 114 篇 控制科学与工程
    • 108 篇 生物医学工程(可授...
    • 101 篇 光学工程
    • 95 篇 电子科学与技术(可...
    • 60 篇 机械工程
    • 50 篇 化学工程与技术
    • 45 篇 交通运输工程
    • 44 篇 仪器科学与技术
    • 35 篇 网络空间安全
    • 30 篇 建筑学
    • 30 篇 安全科学与工程
    • 29 篇 土木工程
  • 580 篇 理学
    • 317 篇 数学
    • 170 篇 生物学
    • 119 篇 物理学
    • 110 篇 统计学(可授理学、...
    • 55 篇 化学
    • 46 篇 系统科学
  • 300 篇 管理学
    • 172 篇 管理科学与工程(可...
    • 141 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 99 篇 医学
    • 90 篇 临床医学
    • 78 篇 基础医学(可授医学...
    • 56 篇 药学(可授医学、理...
  • 42 篇 法学
    • 34 篇 社会学
  • 24 篇 经济学
  • 19 篇 农学
  • 13 篇 教育学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 80 篇 semantics
  • 61 篇 feature extracti...
  • 45 篇 training
  • 43 篇 deep learning
  • 32 篇 computational mo...
  • 32 篇 data models
  • 30 篇 accuracy
  • 28 篇 convolution
  • 28 篇 federated learni...
  • 25 篇 predictive model...
  • 25 篇 machine learning
  • 23 篇 data mining
  • 22 篇 contrastive lear...
  • 21 篇 deep neural netw...
  • 20 篇 image segmentati...
  • 20 篇 neural networks
  • 19 篇 graph neural net...
  • 19 篇 visualization
  • 18 篇 robustness
  • 17 篇 codes

机构

  • 54 篇 shandong provinc...
  • 46 篇 shandong enginee...
  • 44 篇 key laboratory o...
  • 43 篇 college of compu...
  • 41 篇 national enginee...
  • 39 篇 beijing advanced...
  • 37 篇 school of cyber ...
  • 36 篇 college of compu...
  • 35 篇 school of comput...
  • 33 篇 nanyang technolo...
  • 33 篇 university of ch...
  • 28 篇 school of big da...
  • 27 篇 peng cheng labor...
  • 26 篇 hubei key labora...
  • 26 篇 national enginee...
  • 25 篇 hubei engineerin...
  • 24 篇 school of comput...
  • 23 篇 services computi...
  • 23 篇 cluster and grid...
  • 21 篇 college of compu...

作者

  • 68 篇 niyato dusit
  • 30 篇 jin hai
  • 22 篇 sun geng
  • 21 篇 hai jin
  • 19 篇 shen linlin
  • 18 篇 hu shengshan
  • 18 篇 wang jiacheng
  • 17 篇 huang qingming
  • 16 篇 liu ya-feng
  • 16 篇 xu qianqian
  • 15 篇 li jiahui
  • 15 篇 liu bin
  • 14 篇 huang sheng
  • 14 篇 zhang leo yu
  • 13 篇 chen yanping
  • 13 篇 cao xiaochun
  • 13 篇 li minghui
  • 12 篇 yang yang
  • 12 篇 zhou ziqi
  • 12 篇 wang lihui

语言

  • 1,428 篇 英文
  • 125 篇 其他
  • 34 篇 中文
检索条件"机构=The Key Laboratory of Data Engineering and Visual Computing"
1574 条 记 录,以下是331-340 订阅
排序:
Security Enhancing for IRS-Aided NOMA Networks via Constructive Interference Precoding  10
Security Enhancing for IRS-Aided NOMA Networks via Construct...
收藏 引用
10th IEEE International Symposium on Microwave, Antenna, Propagation and EMC Technologies for Wireless Communications, MAPE 2024
作者: Bao, Jingying Cao, Yang Qin, Xiaoqi Xu, Lexi Zhao, Nan Niyato, Dusit School of Information and Communication Engineering Dalian University of Technology Dalian116024 China Singapore University of Technology and Design Engineering Systems and Design Pillar Singapore487372 Singapore Beijing University of Posts and Telecommunications State Key Laboratory of Networking and Switching Technology Beijing100876 China Research Institute China United Network Communications Corporation Beijing100048 China College of Computing and Data Science Nanyang Technological University Singapore639798 Singapore
In this paper, we propose a constructive interference precoding (CIP) enabled secure intelligent reflecting surface (IRS)-non-orthogonal multiple access (NOMA) scheme, lever-aging both the inter-user interference and ... 详细信息
来源: 评论
Temporal Feature Aggregation for Efficient 2D Video Grounding
Temporal Feature Aggregation for Efficient 2D Video Groundin...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Mohan Chen Yiren Zhang Jueqi Wei Yuejie Zhang Rui Feng Tao Zhang Shang Gao School of Computer Science Shanghai Key Laboratory of Intelligent Information Processing Shanghai Collaborative Innovation Center of Intelligent Visual Computing Fudan University School of Information Management and Engineering Shanghai Key Laboratory of Financial Information Technology Shanghai University of Finance and Economics School of Information Technology Deakin University
Video grounding aims to locate the target video moment in an untrimmed video based on a text query. Most existing methods employ 3D CNNs as the video feature extractor, incurring substantial computational costs. Only ... 详细信息
来源: 评论
No-Reference Stereoscopic Image Quality Assessment Based on Binocular Collaboration
SSRN
收藏 引用
SSRN 2024年
作者: Guo, Wenzhong Wang, Hanling Ke, Xiao Fujian Provincial Key Laboratory of Networking Computing and Intelligent Information Processing College of Computer and Data Science Fuzhou University Fujian Fuzhou350116 China Engineering Research Center of Big Data Intelligence Ministry of Education Fuzhou University Fuzhou350116 China
Stereoscopic images usually consist of a left view, a right view, and depth information. Stereoscopic/3D image quality assessment (SIQA) is often more challenging compared to 2D-IQA due to the usual scene differences ... 详细信息
来源: 评论
GM-DF: Generalized Multi-Scenario Deepfake Detection
arXiv
收藏 引用
arXiv 2024年
作者: Lai, Yingxin Yu, Zitong Yang, Jing Li, Bin Kang, Xiangui Shen, Linlin The School of Computing and Information Technology Great Bay University Dongguan523000 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen University Shenzhen518060 China The Guangdong Key Laboratory of Information Security The School of Computer Science and Engineering Sun Yat-sen University Guangzhou510080 China Computer Vision Institute School of Computer Science & Software Engineering Shenzhen Institute of Artificial Intelligence and Robotics for Society Guangdong Key Laboratory of Intelligent Information Processing National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China
Existing face forgery detection usually follows the paradigm of training models in a single domain, which leads to limited generalization capacity when unseen scenarios and unknown attacks occur. In this paper, we ela... 详细信息
来源: 评论
A Novel Feature Selection Strategy Based on Salp Swarm Algorithm for Plant Disease Detection
收藏 引用
Plant Phenomics 2023年 第2期5卷 209-225页
作者: Xiaojun Xie Fei Xia Yufeng Wu Shouyang Liu Ke Yan Huanliang Xu Zhiwei Ji College of Artificial Intelligence Nanjing Agricultural UniversityNanjingJiangsu 210095China Center for Data Science and Intelligent Computing Nanjing Agricultural UniversityNanjingJiangsu 210095China State Key Laboratory for Crop Genetics and Germplasm Enhancement Bioinformatics CenterAcademy for Advanced Interdisciplinary StudiesNanjing Agricultural UniversityNanjingJiangsu 210095China Academy for Advanced Interdisciplinary Studies Nanjing Agricultural UniversityNanjingJiangsu 210095China Department of the Built Environment College of Design and EngineeringNational University of Singapore4 Architecture DriveSingapore 117566Singapore
Deep learning has been widely used for plant disease recognition in smart agriculture and has proven to be a powerful tool for image classification and pattern ***,it has limited interpretability for deep *** the tran... 详细信息
来源: 评论
Memory-Augmented Transformer for Efficient End-to-End Video Grounding
Memory-Augmented Transformer for Efficient End-to-End Video ...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Yuanwu Xu Mohan Chen Yuejie Zhang Rui Feng Tao Zhang Shang Gao School of Computer Science Shanghai Key Laboratory of Intelligent Information Processing Shanghai Collaborative Innovation Center of Intelligent Visual Computing Fudan University School of Information Management and Engineering Shanghai Key Laboratory of Financial Information Technology Shanghai University of Finance and Economics School of Information Technology Deakin University
Video grounding aims to localize a specific segment corresponding to a text query in an untrimmed video. Due to the tremendous computational cost required to process the video frames, the de facto paradigm of video gr... 详细信息
来源: 评论
Stealthy Backdoor Attack Towards Federated Automatic Speaker Verification
Stealthy Backdoor Attack Towards Federated Automatic Speaker...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Longling Zhang Lyqi Liu Dan Meng Jun Wang Shengshan Hu School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security OPPO Research Institute China
Automatic speech verification (ASV) authenticates individuals based on distinct vocal patterns, playing a pivotal role in many applications such as voice-based unlocking systems for devices. The ASV system comprises t...
来源: 评论
Bidirectional Weighted Co-Association-Based Clustering Ensemble Algorithm for High-Speed Train Delay Prediction  29th
Bidirectional Weighted Co-Association-Based Clustering Ensem...
收藏 引用
29th International Conference on Computational and Experimental engineering and Sciences, ICCES 2023
作者: Zhao, Yi Bai, Muchen Ni, Panpan Jiang, Yunan Feng, Xuan Zhang, Xiaobo School of Design SouthWest Jiaotong University Chengdu611756 China School of Computing and Artificial Intelligence SouthWest Jiaotong University Chengdu611756 China Sichuan Institute of Computer Sciences Chengdu610042 China National Engineering Laboratory of Integrated Transportation Big Data Application Technology Southwest Jiaotong University Chengdu611756 China Manufacturing Industry Chains Collaboration and Information Support Technology Key Laboratory of Sichuan Province Southwest Jiaotong University Chengdu611756 China
In recent years, high-speed trains are one of the popular research topics in the field of transportation and have attracted much attention from scholars at home and abroad in view of their high efficiency and safety f... 详细信息
来源: 评论
Real-Time Interactive Face Beautification
SSRN
收藏 引用
SSRN 2024年
作者: Lin, Luojun Chen, Wang Chen, Peizhen Zheng, Xiawu Jin, Lianwen College of Computer and Data Science Fuzhou University China Key Laboratory of Multimedia Trusted Perception and Efficient Computing Xiamen University China School of Electronic and Information Engineering South China University of Technology China
The increasing popularity of sharing visually appealing self-portraits on social media platforms accentuates the demand for advanced face beautification technologies that can provide immediate results tailored to indi... 详细信息
来源: 评论
Dfier: A Directed Vulnerability Verifier for Ethereum Smart Contracts
SSRN
收藏 引用
SSRN 2023年
作者: Wang, Zeli Dai, Weiqi Li, Ming Choo, Kim-Kwang Raymond Zou, Deqing Chongqing Key Laboratory of Computational Intelligence Key Laboratory of Big Data Intelligent Computing Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education College of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing40065 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio United States
Existing smart contract vulnerability identification approaches mainly focus on complete program detection. Consequently, lots of known potentially vulnerable locations need manual verification, which is energy-exhaus... 详细信息
来源: 评论