咨询与建议

限定检索结果

文献类型

  • 307 篇 期刊文献
  • 247 篇 会议

馆藏范围

  • 554 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 296 篇 计算机科学与技术...
    • 264 篇 软件工程
    • 68 篇 信息与通信工程
    • 50 篇 生物工程
    • 45 篇 光学工程
    • 44 篇 控制科学与工程
    • 39 篇 电气工程
    • 33 篇 生物医学工程(可授...
    • 27 篇 机械工程
    • 27 篇 电子科学与技术(可...
    • 25 篇 化学工程与技术
    • 14 篇 土木工程
    • 13 篇 建筑学
    • 13 篇 交通运输工程
    • 12 篇 安全科学与工程
    • 9 篇 力学(可授工学、理...
    • 9 篇 材料科学与工程(可...
    • 9 篇 网络空间安全
  • 208 篇 理学
    • 95 篇 数学
    • 68 篇 物理学
    • 57 篇 生物学
    • 36 篇 统计学(可授理学、...
    • 27 篇 化学
    • 15 篇 系统科学
  • 103 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 48 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 28 篇 医学
    • 25 篇 临床医学
    • 23 篇 基础医学(可授医学...
    • 18 篇 药学(可授医学、理...
  • 8 篇 法学
  • 7 篇 经济学
  • 5 篇 农学
  • 4 篇 教育学

主题

  • 21 篇 semantics
  • 18 篇 training
  • 16 篇 deep learning
  • 16 篇 feature extracti...
  • 14 篇 neural networks
  • 12 篇 contrastive lear...
  • 10 篇 computational mo...
  • 10 篇 computer vision
  • 9 篇 conferences
  • 9 篇 object detection
  • 9 篇 semantic segment...
  • 9 篇 task analysis
  • 8 篇 benchmark testin...
  • 8 篇 machine learning
  • 8 篇 forecasting
  • 7 篇 data models
  • 6 篇 deep neural netw...
  • 6 篇 transformers
  • 6 篇 signal processin...
  • 6 篇 speech processin...

机构

  • 191 篇 school of comput...
  • 156 篇 key laboratory o...
  • 54 篇 guangdong provin...
  • 40 篇 peng cheng labor...
  • 34 篇 laboratory for a...
  • 20 篇 college of intel...
  • 19 篇 key laboratory o...
  • 17 篇 the school of co...
  • 16 篇 guangdong key la...
  • 14 篇 sun yat-sen univ...
  • 13 篇 tianjin key labo...
  • 12 篇 pazhou lab
  • 12 篇 guangdong key la...
  • 11 篇 japan advanced i...
  • 11 篇 tianjin key labo...
  • 11 篇 ministry of educ...
  • 10 篇 institute of art...
  • 10 篇 tianjin key labo...
  • 9 篇 school of comput...
  • 9 篇 guangdong key la...

作者

  • 85 篇 zheng wei-shi
  • 31 篇 xie xiaohua
  • 29 篇 wei-shi zheng
  • 24 篇 lai jianhuang
  • 20 篇 lai jian-huang
  • 19 篇 wang ruixuan
  • 17 篇 wang chang-dong
  • 16 篇 yang lingxiao
  • 13 篇 wu xiao-ming
  • 12 篇 lin kun-yu
  • 12 篇 yunong zhang
  • 12 篇 wu ancong
  • 11 篇 lu wei
  • 10 篇 yan junkai
  • 9 篇 meng jingke
  • 9 篇 jianhuang lai
  • 9 篇 wei yi-lin
  • 9 篇 qu dan
  • 9 篇 hu jian-fang
  • 8 篇 dang jianwu

语言

  • 509 篇 英文
  • 45 篇 其他
  • 3 篇 中文
检索条件"机构=The Laboratory for Advanced Computing and Intelligence Engineering"
554 条 记 录,以下是151-160 订阅
排序:
Halftone Image Steganography Based on Minimizing Distortion with Pixel Density Transition  7th
Halftone Image Steganography Based on Minimizing Distortion...
收藏 引用
7th International Conference on Artificial intelligence and Security, ICAIS 2021
作者: Yu, Mujian Luo, Junwei Xu, Bozhi Chen, Guoliang Lu, Wei School of Computer Science and Engineering Guangdong Key Laboratory of Information Security Technology Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing Sun Yat-sen University Guangzhou510006 China Guangdong Science and Technology Innovation Monitoring and Research Center Guangzhou510033 China
Many advanced halftone steganographic schemes focus only on the distortion of human visual perception or the distortion according to statistics. In this paper, a halftone image steganography based on minimizing distor... 详细信息
来源: 评论
Answer-Centric Local and Global Information Fusion for Conversational Question Generation  12
Answer-Centric Local and Global Information Fusion for Conve...
收藏 引用
12th IEEE International Conference on Big Knowledge, ICBK 2021
作者: Lei, Panpan Sun, Xiao Hefei University of Technology Anhui Province Key Laboratory of Affective Computing and Advanced Intelligent Machine School of Computer Science and Information Engineering Anhui Hefei China Institute of Artificial Intelligence Hefei Comprehensive National Science Center Anhui Hefei China
Conversational Question Generation (CQG) is a new concern in Question Generation (QG) study. Recently Seq2Seq neural network model has been widely used in the QG area. CQG model is also based on the Seq2Seq neural net... 详细信息
来源: 评论
EmoDamp: A Model for Speaker Emotion Inference in Dialogues with Bidirectional Emotion Damping Mechanism  6
EmoDamp: A Model for Speaker Emotion Inference in Dialogues ...
收藏 引用
6th International Conference on Algorithms, computing and Artificial intelligence, ACAI 2023
作者: Jiang, Yueqi Sun, Xiao Wang, Jiamin AnHui Province Key Laboratory of Affective Computing and Advanced Intelligent Machine School of Computer Science and Information Engineering Hefei University of Technology Anhui Hefei China Institute of Artificial Intelligence Hefei Comprehensive National Science Center Anhui Hefei China
Emotion analysis in conversation has been a popular research topic in the natural language processing field. While much of the existing research has focused on emotion recognition in conversation, the emotion inferenc... 详细信息
来源: 评论
Halftone Image Steganalysis by Reconstructing Grayscale Image  7th
Halftone Image Steganalysis by Reconstructing Grayscale Imag...
收藏 引用
7th International Conference on Artificial intelligence and Security, ICAIS 2021
作者: Luo, Junwei Lin, Cong Zeng, Lingwen Liang, Jifan Lu, Wei School of Computer Science and Engineering Guangdong Province Key Laboratory of Information Security Technology Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing Sun Yat-sen University Guangzhou510006 China School of Statistics and Mathematics Guangdong University of Finance and Economics Guangzhou510320 China
Utilizing some special pixels patterns constructing the steganalytic features is popular in binary image steganalysis, which could be also used in halftone image. There is almost no specific image steganalysis for hal... 详细信息
来源: 评论
BAT: A Versatile Bipartite Attention-based Approach for Comprehensive Truth Inference in Mobile Crowdsourcing
收藏 引用
IEEE Transactions on Mobile computing 2025年
作者: Liu, Jiacheng Tang, Feilong Liu, Hao Chen, Long Yu, Yichuan Zhu, Yanmin Yu, Jiadi Hou, Xiaofeng Heng, Pheng-Ann The Chinese University of Hong Kong Department of Computer Science and Engineering 999077 Hong Kong Shanghai Jiao Tong University School of Computer Science Shanghai200240 China East China Normal University School of Data Science and Engineering China Simon Fraser University School of Computing Science Canada Huawei Technologies Co. Ltd China Chinese Academy of Sciences Guangdong-Hong Kong-Macao Joint Laboratory of Human-Machine Intelligence-Synergy Systems Shenzhen Institutes of Advanced Technology Shenzhen518055 China
The proliferation of smart mobile devices has catalyzed the growth of Mobile CrowdSourcing (MCS) as a distributed problem-solving paradigm. MCS platforms heavily rely on advanced truth inference techniques to extract ... 详细信息
来源: 评论
Frozen-DETR: Enhancing DETR with Image Understanding from Frozen Foundation Models  38
Frozen-DETR: Enhancing DETR with Image Understanding from Fr...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Fu, Shenghao Yan, Junkai Yang, Qize Wei, Xihan Xie, Xiaohua Zheng, Wei-Shi School of Computer Science and Engineering Sun Yat-sen University China Peng Cheng Laboratory Shenzhen518055 China Tongyi Lab Alibaba Group China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China Guangdong Province Key Laboratory of Information Security Technology China Guangdong Guangzhou510555 China
Recent vision foundation models can extract universal representations and show impressive abilities in various tasks. However, their application on object detection is largely overlooked, especially without fine-tunin...
来源: 评论
New Entanglement-Assisted Concatenated Quantum Codes Exceed Quantum Gilbert-Varshamov Bound
New Entanglement-Assisted Concatenated Quantum Codes Exceed ...
收藏 引用
International Conference on Computer and Communications (ICCC)
作者: Renxu Wang Jihao Fan School of Cyber Science and Engineering Nanjing University of Science and Technology Nanjing China Laboratory for Advanced Computing and Intelligence Engineering Wuxi China
Quantum error-correction codes leverage encoding and redundancy to effectively detect and correct errors, thereby enhancing the reliability and accuracy of signal detection. Based on the scheme of entanglement-assiste... 详细信息
来源: 评论
Genetic and phenotypic relationships between coronary atherosclerotic heart disease and electrocardiographic traits
Genetic and phenotypic relationships between coronary athero...
收藏 引用
2022 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2022
作者: Wang, Xinfeng Zhang, Haoyang Xiu, Xuehao Qi, Mengling Yang, Yuedong Zhao, Huiying Sun Yat-sen University Key Laboratory of Machine Intelligence and Advanced Computing of Moe School of Computer Science and Engineering Guangzhou China Sun Yat-sen Memorial Hospital Guangdong Provincial Key Laboratory of Malignant Tumor Epigenetics and Gene Regulation Department of Medical Research Center Guangzhou China
Observational studies have revealed that Coronary Atherosclerotic Heart Disease (CAHD) is associated with abnormal electrocardiogram (ECG) traits. However, it remains unclear whether there are genetic correlations bet... 详细信息
来源: 评论
LLMUZZ: LLM-based seed optimization for black-box device fuzzing
LLMUZZ: LLM-based seed optimization for black-box device fuz...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Guangming Gao Shuitao Gan Xiaofeng Wang Shengkai Zhu School of Artificial Intelligence and Computer Science Jiangnan University China Labortory for Advanced Computing and Intelligence Engineering Wuxi China Pengcheng Laboratory Shenzhen China
As an increasing number of Internet of Things (IoT) devices are being deployed, the threat from vulnerabilities inside these devices is growing. Fuzzing is a primary method used for discovering vulnerabilities in IoT ... 详细信息
来源: 评论
Labrador: Response Guided Directed Fuzzing for Black-box IoT Devices
Labrador: Response Guided Directed Fuzzing for Black-box IoT...
收藏 引用
IEEE Symposium on Security and Privacy
作者: Hangtian Liu Shuitao Gan Chao Zhang Zicong Gao Hongqi Zhang Xiangzhi Wang Guangming Gao Information Engineering University Tsinghua University Laboratory for Advanced Computing and Intelligence Engineering Zhongguancun Laboratory Henan Key Laboratory of Information Security University of Electronic Science and Technology of China
Fuzzing is a popular solution to finding vulnerabilities in software including IoT firmware. However, due to the challenges of emulating or rehosting firmware, some IoT devices (e.g., enterprise-level devices) can onl... 详细信息
来源: 评论