咨询与建议

限定检索结果

文献类型

  • 929 篇 期刊文献
  • 689 篇 会议
  • 1 册 图书

馆藏范围

  • 1,619 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,113 篇 工学
    • 796 篇 计算机科学与技术...
    • 668 篇 软件工程
    • 297 篇 信息与通信工程
    • 196 篇 电气工程
    • 155 篇 生物工程
    • 129 篇 控制科学与工程
    • 108 篇 生物医学工程(可授...
    • 103 篇 光学工程
    • 98 篇 电子科学与技术(可...
    • 60 篇 机械工程
    • 50 篇 化学工程与技术
    • 45 篇 交通运输工程
    • 44 篇 仪器科学与技术
    • 36 篇 网络空间安全
    • 33 篇 建筑学
    • 32 篇 土木工程
    • 32 篇 航空宇航科学与技...
  • 595 篇 理学
    • 325 篇 数学
    • 173 篇 生物学
    • 122 篇 物理学
    • 111 篇 统计学(可授理学、...
    • 55 篇 化学
    • 46 篇 系统科学
  • 313 篇 管理学
    • 181 篇 管理科学与工程(可...
    • 146 篇 图书情报与档案管...
    • 75 篇 工商管理
  • 98 篇 医学
    • 90 篇 临床医学
    • 77 篇 基础医学(可授医学...
    • 56 篇 药学(可授医学、理...
  • 43 篇 法学
    • 34 篇 社会学
  • 24 篇 经济学
  • 19 篇 农学
  • 15 篇 教育学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 80 篇 semantics
  • 64 篇 feature extracti...
  • 46 篇 deep learning
  • 46 篇 training
  • 32 篇 computational mo...
  • 32 篇 data models
  • 30 篇 accuracy
  • 29 篇 federated learni...
  • 28 篇 convolution
  • 25 篇 predictive model...
  • 25 篇 machine learning
  • 23 篇 data mining
  • 23 篇 contrastive lear...
  • 22 篇 deep neural netw...
  • 21 篇 image segmentati...
  • 20 篇 neural networks
  • 19 篇 graph neural net...
  • 19 篇 visualization
  • 19 篇 robustness
  • 17 篇 codes

机构

  • 54 篇 shandong provinc...
  • 52 篇 college of compu...
  • 51 篇 national enginee...
  • 46 篇 shandong enginee...
  • 44 篇 key laboratory o...
  • 39 篇 beijing advanced...
  • 39 篇 school of cyber ...
  • 37 篇 school of comput...
  • 35 篇 nanyang technolo...
  • 35 篇 university of ch...
  • 35 篇 college of compu...
  • 29 篇 national enginee...
  • 28 篇 college of compu...
  • 28 篇 school of big da...
  • 28 篇 hubei key labora...
  • 27 篇 peng cheng labor...
  • 27 篇 hubei engineerin...
  • 26 篇 services computi...
  • 25 篇 cluster and grid...
  • 25 篇 school of comput...

作者

  • 73 篇 niyato dusit
  • 31 篇 jin hai
  • 24 篇 sun geng
  • 23 篇 shen linlin
  • 21 篇 hai jin
  • 20 篇 hu shengshan
  • 20 篇 wang jiacheng
  • 17 篇 huang qingming
  • 16 篇 li jiahui
  • 16 篇 xu qianqian
  • 16 篇 liu bin
  • 15 篇 zhang leo yu
  • 15 篇 liu ya-feng
  • 14 篇 huang sheng
  • 14 篇 zhou ziqi
  • 13 篇 cao xiaochun
  • 13 篇 li minghui
  • 12 篇 wang jinbao
  • 12 篇 yang yang
  • 12 篇 wang lihui

语言

  • 1,423 篇 英文
  • 176 篇 其他
  • 33 篇 中文
检索条件"机构=The Key Laboratory of Data Engineering and Visual Computing"
1619 条 记 录,以下是931-940 订阅
排序:
Privacy-Preserving Federated Learning Framework with Resisting Source Inference Attacks in Smart Healthcare
SSRN
收藏 引用
SSRN 2024年
作者: Chenghe, Dong Xu, Guangquan Zhang, Jianhong Bai, Hongpeng Hao, Peng College of Intelligence and Computing Tianjin University Tianjin300354 China School of Big Data Qingdao Huanghai University Qingdao China Tianjin300350 China Department of Electrical and Computer Engineering North China University of Technology Beijing100144 China Key Laboratory of Intelligent Education Technology Application of Zhejiang Province School of Computer Science and Technology Zhejiang Normal University Jinhua321004 China
Federated Learning (FL) is a distributed machine learning technology that is extensive applications in smart healthcare, since it allows multiple medical institutions to jointly train medical diagnostic models without... 详细信息
来源: 评论
Improved publicly verifiable auditing protocol for cloud storage
Improved publicly verifiable auditing protocol for cloud sto...
收藏 引用
作者: Zhang, Jindan Lin, Chuan Ogiela, Urszula Nedjah, Nadia Sangaiah, Arun K. Wang, Xuan Department of Electronic Information Xianyang Vocational Technical College Xianyang China Guizhou Provincial Key Laboratory of Public Big Data GuiZhou University Guiyang China Pedagogical University of Krakow Krakow Poland Department of Electronics Engineering and Telecommunications at the Faculty of Engineering State University of Rio de Janeiro Rio de Janeiro Brazil School of Computing Science and Engineering Vellore Institute of Technology Vellore India
Outsourcing data to cloud servers is a popular service for data owners, however, how to check the integrity and freshness of the outsourced data is very challenge. Recently, Jin et al. proposed a cloud auditing protoc... 详细信息
来源: 评论
Semantic-Enhanced Attention Network for Image-Text Matching
Semantic-Enhanced Attention Network for Image-Text Matching
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Huanxiao Zhou Yushui Geng Jing Zhao Xishan Ma Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Graduate School Qilu University of Technology (Shandong Academy of Sciences) Jinan China
Image-text matching is an important task in cross-modal information processing, which consists of evaluating the similarity between images and text. However, the data of the two modalities have different distributions... 详细信息
来源: 评论
A Triangular Stable Node Network based on Self-supervised Learning for personalized prediction
A Triangular Stable Node Network based on Self-supervised Le...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Qing Liu Qian Gao Jun Fan Zhiqiang Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China China Telecom Digital Intelligence Techonology Co Ltd Jinan China
In recent years, research has illuminated the potency of implicit data processing in enhancing user preferences. Nevertheless, barriers remain in breaking through the constraints of implicit information. This study ai... 详细信息
来源: 评论
Symmetric Private Shortest Path Retrieval for LM-Enabled Route Services on Consumer Devices
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Liu, Xuefeng Lyu, Fake Lei, Jing Yang, Mengmeng Yau, Kok-Lim Alvin Lin, Yangfei Xidian University School of Cyber Engineering Shaanxi Xi’an710071 China Shaanxi Key Laboratory of Blockchain and Secure Computing China Commonwealth Scientific and Industrial Research Organization Data61 Black MountainACT2601 Australia Universiti Tunku Abdul Rahman Department of Internet Engineering and Computer Science Selangor Kajang43200 Malaysia University of Tsukuba Department of Computer Science Tsukuba305-8577 Japan
Route optimization is widely utilized in consumer electronics like Google Maps and Facebook connections. However, due to the limitations of consumer devices, users often rely on online service providers to process lar... 详细信息
来源: 评论
Generative AI for Deep Reinforcement Learning: Framework, Analysis, and Use Cases
arXiv
收藏 引用
arXiv 2024年
作者: Sun, Geng Xie, Wenwen Niyato, Dusit Mei, Fang Kang, Jiawen Du, Hongyang Mao, Shiwen College of Computer Science and Technology Jilin University Changchun130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun130012 China College of Computing and Data Science Nanyang Technological University Singapore639798 Singapore School of Automation Guangdong University of Technology Guangzhou510006 China Department of Electrical and Electronic Engineering The University of Hong Kong 999077 Hong Kong Department of Electrical and Computer Engineering Auburn University Auburn36830 United States
As a form of artificial intelligence (AI) technology based on interactive learning, deep reinforcement learning (DRL) has been widely applied across various fields and has achieved remarkable accomplishments. However,... 详细信息
来源: 评论
Semi-Supervised Clustering Framework for Fine-grained Scene Graph Generation  39
Semi-Supervised Clustering Framework for Fine-grained Scene ...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Yang, Jiarui Wang, Chuan Zhang, Jun Wu, Shuyi Jinjing, Zhao Liu, Zeming Yang, Liang Shanghai Key Lab of Intell. Info. Processing School of Computer Science Fudan University China Shanghai Collaborative Innovation Center on Intelligent Visual Computing China Institute of Information Engineering CAS China School of Computer Science and Technology Beijing JiaoTong University China Guangdong Provincial Key Lab of Intell. Info. Processing & Shenzhen Key Lab of Media Security Shenzhen University China Information Research Center of Military Science PLA Academy of Military Science China National Key Laboratory of Science and Technology on Information System Security China School of Computer Science and Engineering Beihang University China School of Artificial Intelligence Hebei University of Technology China
Scene Graph Generation (SGG) aims to detect all objects and identify their pairwise relationships existing in the scene. Considering the substantial human labor costs, existing scene graph annotations are often sparse...
来源: 评论
MagLive: Robust Voice Liveness Detection on Smartphones Using Magnetic Pattern Changes
arXiv
收藏 引用
arXiv 2024年
作者: Sun, Xiping Chen, Jing Wu, Cong He, Kun Xu, Haozhe Feng, Yebo Du, Ruiying Chen, Xianhao Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan430072 China Rizhao Institute of Information Technology Wuhan University Rizhao276800 China School of Computer Science and Engineering Nanyang Technological University Singapore Collaborative Innovation Center of Geospatial Technology Wuhan430079 China The Department of Electrical and Electronic Engineering HKU Musketeers Foundation Institute of Data Science University of Hong Kong Pok Fu Lam Hong Kong
Voice authentication has been widely used on smartphones. However, it remains vulnerable to spoofing attacks, where the attacker replays recorded voice samples from authentic humans using loudspeakers to bypass the vo... 详细信息
来源: 评论
Normal Distribution Function on Descriptor Extraction  11th
Normal Distribution Function on Descriptor Extraction
收藏 引用
11th International Conference on Image and Graphics, ICIG 2021
作者: Yin, Jianhua Liu, Cong Jiang, Jun Wen, Jie Yang, Lihang Zhu, Shilong School of Computer Science and Technology Harbin Institute of Technology Shenzhen518055 China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen518055 China Peng Cheng Laboratory Shenzhen518055 China Shenzhen Key Laboratory of Visual Object Detection and Recognition Harbin Institute of Technology Shenzhen518055 China College of Big Data and Information Engineering Guizhou University Guizhou Guiyang550025 China
The triplet-loss function is widely used in fields of descriptor extraction in recent years and owing to its good performance in various databases. However, some recent works make less effort on the relationship of ad... 详细信息
来源: 评论
Indirect influence in social networks as an induced percolation phenomenon (vol 119, e2100151119, 2022)
收藏 引用
PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA 2022年 第24期119卷 e2100151119-e2100151119页
作者: Xie, Jiarong Wang, Xiangrong Feng, Ling Zhao, Jin-Hua Liu, Wenyuan Moreno, Yamir Hu, Yanqing School of Computer Science and Engineering Sun Yat-sen University 510006 Guangzhou China Institute of Future Networks Southern University of Science and Technology 518055 Shenzhen China Peng Cheng Laboratory 518066 Shenzhen China Institute of High Performance Computing A*STAR 138632 Singapore Department of Physics National University of Singapore 117551 Singapore Guangdong Provincial Key Laboratory of Nuclear Science Institute of Quantum Matter South China Normal University 510006 Guangzhou China Guangdong-Hong Kong Joint Laboratory of Quantum Matter Southern Nuclear Science Computing Center South China Normal University 510006 Guangzhou China Division of Physics and Applied Physics School of Physical and Mathematical Sciences Nanyang Technological University 637371 Singapore Institute for Biocomputation and Physics of Complex Systems University of Zaragoza 50018 Zaragoza Spain Department of Theoretical Physics University of Zaragoza 50018 Zaragoza Spain ISI Foundation 10126 Torino Italy Department of Statistics and Data Science College of Science Southern University of Science and Technology 518055 Shenzhen China
Percolation theory has been widely used to study phase transitions in network systems. It has also successfully explained various macroscopic spreading phenomena across different fields. Yet, the theoretical framework... 详细信息
来源: 评论