咨询与建议

限定检索结果

文献类型

  • 951 篇 期刊文献
  • 712 篇 会议
  • 1 册 图书

馆藏范围

  • 1,664 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,129 篇 工学
    • 808 篇 计算机科学与技术...
    • 671 篇 软件工程
    • 305 篇 信息与通信工程
    • 201 篇 电气工程
    • 153 篇 生物工程
    • 134 篇 控制科学与工程
    • 106 篇 生物医学工程(可授...
    • 104 篇 光学工程
    • 100 篇 电子科学与技术(可...
    • 61 篇 机械工程
    • 52 篇 化学工程与技术
    • 47 篇 仪器科学与技术
    • 47 篇 交通运输工程
    • 38 篇 网络空间安全
    • 35 篇 建筑学
    • 34 篇 土木工程
    • 33 篇 安全科学与工程
  • 606 篇 理学
    • 330 篇 数学
    • 173 篇 生物学
    • 130 篇 物理学
    • 113 篇 统计学(可授理学、...
    • 59 篇 化学
    • 45 篇 系统科学
  • 318 篇 管理学
    • 185 篇 管理科学与工程(可...
    • 150 篇 图书情报与档案管...
    • 75 篇 工商管理
  • 103 篇 医学
    • 95 篇 临床医学
    • 77 篇 基础医学(可授医学...
    • 56 篇 药学(可授医学、理...
  • 44 篇 法学
    • 35 篇 社会学
  • 25 篇 经济学
  • 19 篇 农学
  • 18 篇 教育学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 85 篇 semantics
  • 69 篇 feature extracti...
  • 49 篇 training
  • 48 篇 deep learning
  • 38 篇 federated learni...
  • 36 篇 computational mo...
  • 36 篇 accuracy
  • 32 篇 data models
  • 30 篇 convolution
  • 28 篇 contrastive lear...
  • 25 篇 data mining
  • 25 篇 machine learning
  • 24 篇 predictive model...
  • 21 篇 deep neural netw...
  • 21 篇 image segmentati...
  • 21 篇 neural networks
  • 21 篇 visualization
  • 21 篇 robustness
  • 20 篇 measurement
  • 19 篇 optimization

机构

  • 59 篇 college of compu...
  • 55 篇 key laboratory o...
  • 54 篇 shandong provinc...
  • 52 篇 shandong enginee...
  • 51 篇 national enginee...
  • 39 篇 beijing advanced...
  • 39 篇 school of cyber ...
  • 37 篇 school of comput...
  • 37 篇 university of ch...
  • 34 篇 college of compu...
  • 31 篇 nanyang technolo...
  • 31 篇 school of big da...
  • 29 篇 national enginee...
  • 28 篇 college of compu...
  • 28 篇 hubei key labora...
  • 27 篇 peng cheng labor...
  • 27 篇 hubei engineerin...
  • 26 篇 services computi...
  • 26 篇 school of comput...
  • 25 篇 cluster and grid...

作者

  • 75 篇 niyato dusit
  • 31 篇 jin hai
  • 24 篇 shen linlin
  • 23 篇 sun geng
  • 22 篇 hai jin
  • 20 篇 hu shengshan
  • 20 篇 wang jiacheng
  • 17 篇 huang qingming
  • 16 篇 xu qianqian
  • 16 篇 liu bin
  • 15 篇 zhang leo yu
  • 15 篇 li jiahui
  • 15 篇 liu ya-feng
  • 14 篇 huang sheng
  • 14 篇 zhou ziqi
  • 13 篇 cao xiaochun
  • 13 篇 du hongyang
  • 13 篇 li minghui
  • 12 篇 wang jinbao
  • 12 篇 wang lihui

语言

  • 1,241 篇 英文
  • 403 篇 其他
  • 34 篇 中文
检索条件"机构=The Key Laboratory of Data Engineering and Visual Computing"
1664 条 记 录,以下是901-910 订阅
排序:
Extended Abstract of Graph4Web: A Relation-Aware Graph Attention Network for Web Service Classification
Extended Abstract of Graph4Web: A Relation-Aware Graph Atten...
收藏 引用
IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)
作者: Kunsong Zhao Jin Liu Zhou Xu Xiao Liu Lei Xue Zhiwen Xie Yuxuan Zhou Xin Wang School of Computer Science Wuhan University Wuhan China Ministry of Education Key Laboratory of Dependable Service Computing in Cyber Physical Society (Chongqing University) China School of Big Data and Software Engineering Chongqing University Chongqing China School of Information Technology Deakin University Geelong Australia Department of Computing The Hong Kong Polytechnic University Hong Kong China College of Engineering and Computer Science Syracuse University Syracuse USA
Software reuse, as a means to develop new software products with similar functions by virtue of existing software components, has become a popular way during the software development process. In particular, as the ser... 详细信息
来源: 评论
visualizing nonlinear resonance in nanomechanical systems via single-electron tunneling
收藏 引用
Nano Research 2021年 第4期14卷 1156-1161页
作者: Xinhe Wang Lin Cong Dong Zhu Zi Yuan Xiaoyang Lin Weisheng Zhao Zaiqiao Bai Wenjie Liang Ximing Sun Guang-Wei Deng Kaili Jiang Fert Beijing Research Institute School of Microelectronics&Beijing Advanced Innovation Centre for Big Data and Brain Computing(BDBC)Beihang UniversityBeijing 100191China State Key Laboratory of Low-Dimensional Quantum Physics Department of Physics and Tsinghua-Foxconn Nanotechnology Research CenterTsinghua UniversityBeijing 100084China Key Laboratory of Quantum Information CASUniversity of Science and Technology of ChinaHefei 230026China Department of Physics Beijing Normal UniversityBeijing 100875China Institute of Physics Chinese Academy of SciencesBeijing 100080China Institute of Nuclear and New Energy Technology Collaborative Innovation Center of Advanced Nuclear Energy TechnologyKey Laboratory of Advanced Reactor EngineeringTsinghua UniversityBeijing 100084China Institute of Fundamental and Frontier Sciences University of Electronic Science and Technology of ChinaChengdu 610054China
Numerous reports have elucidated the importance of mechanical resonators comprising quantum-dot-embedded carbon nanotubes(CNTs)for studying the effects of single-electron ***,there is a need to investigate the single-... 详细信息
来源: 评论
Neural multi-objective combinatorial optimization with diversity enhancement  23
Neural multi-objective combinatorial optimization with diver...
收藏 引用
Proceedings of the 37th International Conference on Neural Information Processing Systems
作者: Jinbiao Chen Zizhen Zhang Zhiguang Cao Yaoxin Wu Yining Ma Te Ye Jiahai Wang School of Computer Science and Engineering Sun Yat-sen University P.R. China School of Computing and Information Systems Singapore Management University Singapore Department of Industrial Engineering & Innovation Sciences Eindhoven University of Technology Netherlands Department of Industrial Systems Engineering & Management National University of Singapore Singapore School of Computer Science and Engineering Sun Yat-sen University P.R. China and Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Sun Yat-sen University P.R. China and Guangdong Key Laboratory of Big Data Analysis and Processing Guangzhou P.R. China
Most of existing neural methods for multi-objective combinatorial optimization (MOCO) problems solely rely on decomposition, which often leads to repetitive solutions for the respective subproblems, thus a limited Par...
来源: 评论
UAV Virtual Antenna Array Deployment for Uplink Interference Mitigation in data Collection Networks
arXiv
收藏 引用
arXiv 2024年
作者: Li, Hongjuan Kang, Hui Sun, Geng Li, Jiahui Wang, Jiacheng Wang, Xue Niyato, Dusit Leung, Victor C.M. College of Computer Science and Technology Jilin University Changchun130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun130012 China College of Computing and Data Science Nanyang Technological University Singapore639798 Singapore College of Computing and Data Science Nanyang Technological University Singapore Department of Communication Engineering Jilin University Changchun130012 China Artificial Intelligence Research Institute Shenzhen MSU-BIT University Shenzhen518115 China College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Department of Electrical and Computer Engineering The University of British Columbia VancouverV6T 1Z4 Canada
Unmanned aerial vehicles (UAVs) have gained considerable attention as a platform for establishing aerial wireless networks and communications. However, the line-of-sight dominance in air-to-ground communications often... 详细信息
来源: 评论
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers
arXiv
收藏 引用
arXiv 2023年
作者: Li, Zhen Zhang, Ruqian Zou, Deqing Wang, Ning Li, Yating Xu, Shouhuai Chen, Chen Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Computer Science University of Colorado Colorado Springs United States Center for Research in Computer Vision University of Central Florida United States School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Deep learning has been widely used in source code classification tasks, such as code classification according to their functionalities, code authorship attribution, and vulnerability detection. Unfortunately, the blac... 详细信息
来源: 评论
Clustering by orthogonal NMF model and non-convex penalty optimization
Clustering by orthogonal NMF model and non-convex penalty op...
收藏 引用
作者: Wang, Shuai Chang, Tsung-Hui Cui, Ying Pang, Jong-Shi Shenzhen Research Institute of Big Data and School of Science and Engineering The Chinese University of Hong Kong Shenzhen518172 China Guangdong Provincial Key Laboratory of Big Data Computing and School of Science and Engineering The Chinese University of Hong Kong Shenzhen518172 China Department of Industrial and Systems Engineering University of Minnesota MinneapolisMN55455 United States Department of Industrial and Systems Engineering University of Southern California Los AngelesCA90089 United States
The non-negative matrix factorization (NMF) model with an additional orthogonality constraint on one of the factor matrices, called the orthogonal NMF (ONMF), has been found a promising clustering model and can outper... 详细信息
来源: 评论
UAV-Aided Covert Federated Learning Networks
收藏 引用
IEEE Network 2025年
作者: Wang, Chao Guo, Shaoyong Xiong, Zehui Xing, Chengwen Zhao, Nan Niyato, Dusit Karagiannidis, George Dalian University of Technology School of Information and Communication Engineering Dalian116024 China Beijing University of Posts and Telecommunications State Key Laboratory of Networking and Switching Technology Beijing100876 China Singapore University of Technology and Design Information Systems Technology and Design Pillar 487372 Singapore Beijing Institute of Technology School of Information and Electronics Beijing100081 China Nanyang Technological University College of Computing and Data Science 639798 Singapore Aristotle University of Thessaloniki Department of Electrical and Computer Engineering Greece
With the increasing emphasis on data privacy, federated learning (FL) networks show great potential through distributed training without directly sharing the raw data. However, the coverage of FL terrestrial servers i... 详细信息
来源: 评论
Attribute-Guided Pedestrian Retrieval: Bridging Person Re-ID with Internal Attribute Variability
Attribute-Guided Pedestrian Retrieval: Bridging Person Re-ID...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Yan Huang Zhang Zhang Qiang Wu Yi Zhong Liang Wang Center for Research on Intelligent Perception and Computing (CRIPAC) State Key Laboratory of Multimodal Artificial Intelligence Systems (MAIS) Chinese Academy of Sciences Institute of Automation Beijing China School of Artificial Intelligence University of Chinese Academy of Sciences (UCAS). School of Electrical and Data Engineering University of Technology Sydney Australia School of Information and Electronics Beijing Institute of Technology China
In various domains such as surveillance and smart retail, pedestrian retrieval, centering on person re-identification (Re-ID), plays a pivotal role. Existing Re-ID methodologies often overlook subtle internal attribut... 详细信息
来源: 评论
SED-MVS: Segmentation-Driven and Edge-Aligned Deformation Multi-View Stereo with Depth Restoration and Occlusion Constraint
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年
作者: Yuan, Zhenlong Yang, Zhidong Cai, Yujun Wu, Kuangxin Liu, Mufan Zhang, Dapeng Jiang, Hao Li, Zhaoxin Wang, Zhaoqi Chinese Academy of Sciences Institute of Computing Technology Beijing100190 China School of Electrical Engineering and Computer Science Australia Hunan Police Academy Information Technology Department Changsha410100 China Shanghai Jiao Tong University Cooperative MediaNet Innovation Center Shanghai200240 China Lanzhou University DSLAB School of Information Science and Engineering 730000 China Ministry of Agriculture and Rural Affairs Agricultural Information Institute Chinese Academy of Agricultural Sciences Key Laboratory of Agricultural Big Data 100081 China
Recently, patch-deformation methods have exhibited significant effectiveness in multi-view stereo owing to the deformable and expandable patches in reconstructing textureless areas. However, existing approaches neglec... 详细信息
来源: 评论
Downstream-agnostic Adversarial Examples
arXiv
收藏 引用
arXiv 2023年
作者: Zhou, Ziqi Hu, Shengshan Zhao, Ruizhi Wang, Qian Zhang, Leo Yu Hou, Junhui Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Wuhan University China School of Information and Communication Technology Griffith University Australia Department of Computer Science City University of Hong Kong Hong Kong National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Self-supervised learning usually uses a large amount of unlabeled data to pre-train an encoder which can be used as a general-purpose feature extractor, such that downstream users only need to perform fine-tuning oper... 详细信息
来源: 评论