咨询与建议

限定检索结果

文献类型

  • 942 篇 期刊文献
  • 691 篇 会议
  • 1 册 图书

馆藏范围

  • 1,634 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,127 篇 工学
    • 812 篇 计算机科学与技术...
    • 665 篇 软件工程
    • 301 篇 信息与通信工程
    • 199 篇 电气工程
    • 156 篇 生物工程
    • 143 篇 控制科学与工程
    • 110 篇 生物医学工程(可授...
    • 102 篇 光学工程
    • 101 篇 电子科学与技术(可...
    • 61 篇 机械工程
    • 50 篇 化学工程与技术
    • 46 篇 交通运输工程
    • 45 篇 仪器科学与技术
    • 37 篇 网络空间安全
    • 33 篇 建筑学
    • 31 篇 土木工程
    • 31 篇 航空宇航科学与技...
  • 594 篇 理学
    • 323 篇 数学
    • 174 篇 生物学
    • 122 篇 物理学
    • 111 篇 统计学(可授理学、...
    • 56 篇 化学
    • 46 篇 系统科学
  • 312 篇 管理学
    • 180 篇 管理科学与工程(可...
    • 144 篇 图书情报与档案管...
    • 74 篇 工商管理
  • 101 篇 医学
    • 92 篇 临床医学
    • 79 篇 基础医学(可授医学...
    • 56 篇 药学(可授医学、理...
  • 42 篇 法学
    • 34 篇 社会学
  • 24 篇 经济学
  • 19 篇 农学
  • 13 篇 教育学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 80 篇 semantics
  • 63 篇 feature extracti...
  • 48 篇 deep learning
  • 45 篇 training
  • 32 篇 computational mo...
  • 32 篇 data models
  • 30 篇 accuracy
  • 29 篇 federated learni...
  • 28 篇 convolution
  • 25 篇 predictive model...
  • 25 篇 machine learning
  • 23 篇 data mining
  • 23 篇 contrastive lear...
  • 22 篇 deep neural netw...
  • 21 篇 image segmentati...
  • 20 篇 neural networks
  • 19 篇 graph neural net...
  • 19 篇 visualization
  • 18 篇 robustness
  • 17 篇 codes

机构

  • 54 篇 shandong provinc...
  • 51 篇 college of compu...
  • 51 篇 national enginee...
  • 46 篇 shandong enginee...
  • 44 篇 key laboratory o...
  • 40 篇 school of cyber ...
  • 39 篇 beijing advanced...
  • 37 篇 school of comput...
  • 37 篇 college of compu...
  • 35 篇 nanyang technolo...
  • 35 篇 university of ch...
  • 29 篇 school of big da...
  • 29 篇 national enginee...
  • 28 篇 college of compu...
  • 28 篇 hubei key labora...
  • 27 篇 peng cheng labor...
  • 27 篇 hubei engineerin...
  • 26 篇 services computi...
  • 25 篇 cluster and grid...
  • 25 篇 school of comput...

作者

  • 73 篇 niyato dusit
  • 32 篇 jin hai
  • 24 篇 sun geng
  • 23 篇 shen linlin
  • 21 篇 hai jin
  • 20 篇 hu shengshan
  • 19 篇 wang jiacheng
  • 17 篇 huang qingming
  • 16 篇 liu ya-feng
  • 16 篇 xu qianqian
  • 15 篇 zhang leo yu
  • 15 篇 li jiahui
  • 15 篇 liu bin
  • 14 篇 huang sheng
  • 14 篇 zhou ziqi
  • 13 篇 cao xiaochun
  • 13 篇 li minghui
  • 12 篇 wang jinbao
  • 12 篇 yang yang
  • 12 篇 li tianrui

语言

  • 1,409 篇 英文
  • 203 篇 其他
  • 35 篇 中文
检索条件"机构=The Key Laboratory of Data Engineering and Visual Computing"
1634 条 记 录,以下是611-620 订阅
排序:
Diagnosis of Alzheimer's disease based on logistic regression algorithm
Diagnosis of Alzheimer's disease based on logistic regressio...
收藏 引用
computing, Robotics and System Sciences (ICRSS), International Conference on
作者: YuSi Chen Ning Liu PeiKun Chen School of Mathematics and Computer Science Quanzhou Normal University Fujian Provincial Key Laboratory of Data-Intensive Computing Key Laboratory of Intelligent Computing and Information Processing Quanzhou China School of Public Health Hangzhou Normal University Hangzhou China Department of mathematics and computer science Quanzhou Normal University Fujian Provincial Key Laboratory of Data-Intensive Computing Quanzhou China Xiamen Silicon Field System Engineering Co. Ltd. Xiamen China
Language impairment may be an important early manifestation of dementia. In this study, we propose a multi-feature fusion to distinguish MCI and AD patients. In this paper, a set of acoustic, demographic and linguisti... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tuning
arXiv
收藏 引用
arXiv 2024年
作者: Du, Xiaohu Wen, Ming Zhu, Jiahao Xie, Zifan Ji, Bin Liu, Huijun Shi, Xuanhua Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China College of Computer National University of Defense Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab HUST Wuhan430074 China Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security HUST Wuhan430074 China JinYinHu Laboratory Wuhan430077 China Cluster and Grid Computing Lab HUST Wuhan430074 China
Code Pre-trained Models (CodePTMs) based vulnerability detection have achieved promising results over recent years. However, these models struggle to generalize as they typically learn superficial mapping from source ... 详细信息
来源: 评论
Multi-modal data based Semi-Supervised Learning for Vehicle Positioning
arXiv
收藏 引用
arXiv 2024年
作者: Huan, Ouwen Yang, Yang Luo, Tao Chen, Mingzhe Beijing Laboratory of Advanced Information Network Beijing University of Posts and Telecommunications Beijing100876 China Department of Electrical and Computer Engineering Institute for Data Science and Computing University of Miami Coral GablesFL33146 United States Beijing Key Laboratory of Network System Architecture and Convergence School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing100876 China
In this paper, a multi-modal data based semisupervised learning (SSL) framework that jointly use channel state information (CSI) data and RGB images for vehicle positioning is designed. In particular, an outdoor posit... 详细信息
来源: 评论
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
Detecting Backdoors During the Inference Stage Based on Corr...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Xiaogeng Liu Minghui Li Haoyu Wang Shengshan Hu Dengpan Ye Hai Jin Libing Wu Chaowei Xiao School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Software Engineering Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan University School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab Arizona State University
Deep neural networks are proven to be vulnerable to backdoor attacks. Detecting the trigger samples during the inference stage, i.e., the test-time trigger sample detection, can prevent the backdoor from being trigger...
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensional Input Spaces
Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensiona...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Haoxiang Jia Ming Wen Zifan Xie Xiaochen Guo Rongxin Wu Maolin Sun Kang Chen Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Services Computing Technology and System Lab Cluster and Grid Computing Lab. Hubei Engineering Research Center on Big Data Security National Engineering Research Center for Big Data Technology and System School of Informatics Xiamen University China School of Computer Science and Technology Huazhong University of Science and Technology China
Java Virtual Machine (JVM) is the fundamental software system that supports the interpretation and execution of Java bytecode. To support the surging performance demands for the increasingly complex and large-scale Ja...
来源: 评论
SHAA: Spatial Hybrid Attention Network with Adaptive Cross-Entropy Loss Function for UAV-view Geo-localization
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年
作者: Chen, Nanhua Zhang, Dongshuo Jiang, Kai Yu, Meng Zhu, Yeqing Lou, Tai-Shan Zhao, Liangyu Nanyang Technological University College of Computing and Data Science Singapore639798 Singapore Xidian University State Key Laboratory of Integrated Services Networks Xi'an710071 China Zhengzhou University of Light Industry School of Electrical and Information Engineering Zhengzhou450002 China Beijing Institute of Technology School of Aerospace Engineering Beijing100081 China Beijing Institute of Technology Zhengzhou Research Institute Zhengzhou450000 China Beijing Institute of Technology National Key Laboratory of Land and Air Based Information Perception and Control Beijing100081 China
Cross-view geo-localization provides an offline visual positioning strategy for unmanned aerial vehicles (UAVs) in Global Navigation Satellite System (GNSS)-denied environments. However, it still faces the following c... 详细信息
来源: 评论
Energy Efficient Probabilistic Semantic Communication over SAGIN
Energy Efficient Probabilistic Semantic Communication over S...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Zhouxiang Zhao Zhaohui Yang Mingzhe Chen Xu Gan Chongwen Huang Wei Xu Zhaoyang Zhang College of Information Science and Electronic Engineering Zhejiang University Hangzhou China Zhejiang Provincial Key Laboratory of Info. Proc. Commun. & Netw. (IPCAN) Hangzhou China Department of Electrical and Computer Engineering and Institute for Data Science and Computing University of Miami Coral Gables FL USA National Mobile Communications Research Laboratory Southeast University Nanjing China
In this paper, the energy efficiency maximization problem in space-air-ground integrated network (SAGIN)-enabled probabilistic semantic communication (PSC) is investigated. In the considered model, a satellite needs t... 详细信息
来源: 评论
Provably Secure Authenticated key-Management Mechanism for e-Healthcare Environment
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Ghaffar, Zahid Xie, Yong Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Douliu64002 Taiwan Qinghai Institute of Technology School of Computer and Information Science China Qinghai Provincial Laboratory for Intelligent Computing and Application China Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan250353 China
The Internet of Things (IoT) is rapidly permeating all aspects of human life, involving a network of devices that share sensitive data. A notable application is the e-healthcare systems, which employ connected sensors... 详细信息
来源: 评论