咨询与建议

限定检索结果

文献类型

  • 942 篇 期刊文献
  • 691 篇 会议
  • 1 册 图书

馆藏范围

  • 1,634 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,127 篇 工学
    • 812 篇 计算机科学与技术...
    • 665 篇 软件工程
    • 301 篇 信息与通信工程
    • 199 篇 电气工程
    • 156 篇 生物工程
    • 143 篇 控制科学与工程
    • 110 篇 生物医学工程(可授...
    • 102 篇 光学工程
    • 101 篇 电子科学与技术(可...
    • 61 篇 机械工程
    • 50 篇 化学工程与技术
    • 46 篇 交通运输工程
    • 45 篇 仪器科学与技术
    • 37 篇 网络空间安全
    • 33 篇 建筑学
    • 31 篇 土木工程
    • 31 篇 航空宇航科学与技...
  • 594 篇 理学
    • 323 篇 数学
    • 174 篇 生物学
    • 122 篇 物理学
    • 111 篇 统计学(可授理学、...
    • 56 篇 化学
    • 46 篇 系统科学
  • 312 篇 管理学
    • 180 篇 管理科学与工程(可...
    • 144 篇 图书情报与档案管...
    • 74 篇 工商管理
  • 101 篇 医学
    • 92 篇 临床医学
    • 79 篇 基础医学(可授医学...
    • 56 篇 药学(可授医学、理...
  • 42 篇 法学
    • 34 篇 社会学
  • 24 篇 经济学
  • 19 篇 农学
  • 13 篇 教育学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 80 篇 semantics
  • 63 篇 feature extracti...
  • 48 篇 deep learning
  • 45 篇 training
  • 32 篇 computational mo...
  • 32 篇 data models
  • 30 篇 accuracy
  • 29 篇 federated learni...
  • 28 篇 convolution
  • 25 篇 predictive model...
  • 25 篇 machine learning
  • 23 篇 data mining
  • 23 篇 contrastive lear...
  • 22 篇 deep neural netw...
  • 21 篇 image segmentati...
  • 20 篇 neural networks
  • 19 篇 graph neural net...
  • 19 篇 visualization
  • 18 篇 robustness
  • 17 篇 codes

机构

  • 54 篇 shandong provinc...
  • 51 篇 college of compu...
  • 51 篇 national enginee...
  • 46 篇 shandong enginee...
  • 44 篇 key laboratory o...
  • 40 篇 school of cyber ...
  • 39 篇 beijing advanced...
  • 37 篇 school of comput...
  • 37 篇 college of compu...
  • 35 篇 nanyang technolo...
  • 35 篇 university of ch...
  • 29 篇 school of big da...
  • 29 篇 national enginee...
  • 28 篇 college of compu...
  • 28 篇 hubei key labora...
  • 27 篇 peng cheng labor...
  • 27 篇 hubei engineerin...
  • 26 篇 services computi...
  • 25 篇 cluster and grid...
  • 25 篇 school of comput...

作者

  • 73 篇 niyato dusit
  • 32 篇 jin hai
  • 24 篇 sun geng
  • 23 篇 shen linlin
  • 21 篇 hai jin
  • 20 篇 hu shengshan
  • 19 篇 wang jiacheng
  • 17 篇 huang qingming
  • 16 篇 liu ya-feng
  • 16 篇 xu qianqian
  • 15 篇 zhang leo yu
  • 15 篇 li jiahui
  • 15 篇 liu bin
  • 14 篇 huang sheng
  • 14 篇 zhou ziqi
  • 13 篇 cao xiaochun
  • 13 篇 li minghui
  • 12 篇 wang jinbao
  • 12 篇 yang yang
  • 12 篇 li tianrui

语言

  • 1,409 篇 英文
  • 203 篇 其他
  • 35 篇 中文
检索条件"机构=The Key Laboratory of Data Engineering and Visual Computing"
1634 条 记 录,以下是761-770 订阅
排序:
Backdoor Attack with Sparse and Invisible Trigger
arXiv
收藏 引用
arXiv 2023年
作者: Gao, Yinghua Li, Yiming Gong, Xueluan Li, Zhifeng Xia, Shu-Tao Wang, Qian The Tsinghua Shenzhen International Graduate School Tsinghua University Shenzhen518055 China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou311200 China College of Computing and Data Science Nanyang Technological University 639798 Singapore The School of Computer Science Wuhan University China Tencent Data Platform Shenzhen518057 China The Research Center of Artificial Intelligence Peng Cheng Laboratory Shenzhen518000 China The School of Cyber Science and Engineering Wuhan University China
Deep neural networks (DNNs) are vulnerable to backdoor attacks, where the adversary manipulates a small portion of training data such that the victim model predicts normally on the benign samples but classifies the tr... 详细信息
来源: 评论
Contamination-resilient anomaly detection via adversarial learning on partially-observed normal and anomalous data  24
Contamination-resilient anomaly detection via adversarial le...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Wenxi Lv Qinliang Su Hai Wan Hongteng Xu Wenchao Xu School of Computer Science and Engineering Sun Yat-sen University Guangzhou China School of Computer Science and Engineering Sun Yat-sen University Guangzhou China and Guangdong Key Laboratory of Big Data Analysis and Processing Guangzhou China Gaoling School of Artifical Intelligence Renmin University of China Beijing China Department of Computing The Hong Kong Polytechnic University Hong Kong SAR
Many existing anomaly detection methods assume the availability of a large-scale normal dataset. But for many applications, limited by resources, removing all anomalous samples from a large unlabeled dataset is unreal...
来源: 评论
JTEA: Implementing Semi-Supervised Entity Alignment Using Joint Teaching Strategies
JTEA: Implementing Semi-Supervised Entity Alignment Using Jo...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Kai Lu Jing Zhao Lichao Ding Zenghao Hao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Faculty of Computer Science and Technology Shandong Engineering Research Center of Big Data Applied Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Entity alignment(EA) aims to identify equivalent entities in different knowledge graphs or data sources and establish correspondences between them. In recent years, embedding-based methods have made significant progre... 详细信息
来源: 评论
HGTA: News Recommendation Based on Hierarchical Granular Semantic Embeddings and Threshold Attention
HGTA: News Recommendation Based on Hierarchical Granular Sem...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Yiwen Li Zhenyu Yang Zhijun Li Xiaoyang Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Personalized news recommendation helps users find interesting content among much news information. Most existing news recommendation techniques densely interact a user’s historical clicked news with candidate news to... 详细信息
来源: 评论
LESaET: Low-Dimensional Embedding Method for Link Prediction Combining Self-Attention and Enhanced-TuckER
LESaET: Low-Dimensional Embedding Method for Link Prediction...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Lichao Ding Jing Zhao Kai Lu Zenghao Hao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Knowledge graphs (KGs) provide a structured representation of the real world through entity-relation triples. However, current KGs are often incomplete, typically containing only a small fraction of all possible facts... 详细信息
来源: 评论
Security Enhancing for IRS-Aided NOMA Networks via Constructive Interference Precoding
Security Enhancing for IRS-Aided NOMA Networks via Construct...
收藏 引用
International Symposium on Microwave, Antenna, Propagation and EMC Technologies for Wireless Communications (MAPE)
作者: Jingying Bao Yang Cao Xiaoqi Qin Lexi Xu Nan Zhao Dusit Niyato School of Information and Communication Engineering Dalian University of Technology Dalian China Engineering Systems and Design Pillar Singapore University of Technology and Design Singapore State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China Research Institute China United Network Communications Corporation Beijing China College of Computing and Data Science Nanyang Technological University Singapore
In this paper, we propose a constructive interference precoding (CIP) enabled secure intelligent reflecting surface (IRS)-non-orthogonal multiple access (NOMA) scheme, lever-aging both the inter-user interference and ... 详细信息
来源: 评论
Overcoming data Limitations and Cross-Modal Interaction Challenges in Medical visual Question Answering
Overcoming Data Limitations and Cross-Modal Interaction Chal...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Yurun Bi Xingang Wang Qingao Wang Jinxiao Yang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Medical visual Question Answering (Med-VQA) is a sophisticated multimodal technology within the medical domain that utilizes natural language processing and artificial intelligence techniques. It serves as a tool in t... 详细信息
来源: 评论
Opinion-Tree-guided Contrastive Learning for Aspect Sentiment Quadruple Prediction
Opinion-Tree-guided Contrastive Learning for Aspect Sentimen...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Zhijun Li Zhenyu Yang Yiwen Li Xiaoyang Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In recent years, aspect sentiment quadruple prediction (ASQP) has become a popular task in the field of aspect-based sentiment analysis. When modeling comment statements, it is often necessary to consider structural i... 详细信息
来源: 评论
Denial-of-Service or Fine-Grained Control: Towards Flexible Model Poisoning Attacks on Federated Learning
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Hangtao Yao, Zeming Zhang, Leo Yu Hu, Shengshan Chen, Chao Liew, Alan Li, Zhetao School of Cyber Science and Engineering Huazhong University of Science and Technology China Swinburne University of Technology Australia Griffith University Australia National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab. Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China RMIT University Australia Xiangtan University China
Federated learning (FL) is vulnerable to poisoning attacks, where adversaries corrupt the global aggregation results and cause denial-of-service (DoS). Unlike recent model poisoning attacks that optimize the amplitude... 详细信息
来源: 评论
FaceBench: A Multi-View Multi-Level Facial Attribute VQA dataset for Benchmarking Face Perception MLLMs
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Xiaoqin Ma, Xusen Hou, Xianxu Ding, Meidan Li, Yudong Chen, Junliang Chen, Wenting Peng, Xiaoyang Shen, Linlin Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China AIAC Xi’an Jiaotong-Liverpool University China Tsinghua University China The Hong Kong Polytechnic University Hong Kong City University of Hong Kong Hong Kong Sun Yat-sen University China
Multimodal large language models (MLLMs) have demonstrated remarkable capabilities in various tasks. However, effectively evaluating these MLLMs on face perception remains largely unexplored. To address this gap, we i...
来源: 评论