咨询与建议

限定检索结果

文献类型

  • 829 篇 期刊文献
  • 480 篇 会议
  • 12 册 图书

馆藏范围

  • 1,321 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 891 篇 工学
    • 668 篇 计算机科学与技术...
    • 564 篇 软件工程
    • 212 篇 信息与通信工程
    • 144 篇 生物工程
    • 134 篇 电气工程
    • 95 篇 生物医学工程(可授...
    • 93 篇 控制科学与工程
    • 92 篇 光学工程
    • 74 篇 电子科学与技术(可...
    • 62 篇 机械工程
    • 43 篇 化学工程与技术
    • 35 篇 交通运输工程
    • 32 篇 网络空间安全
    • 30 篇 动力工程及工程热...
    • 29 篇 安全科学与工程
    • 28 篇 仪器科学与技术
  • 507 篇 理学
    • 253 篇 数学
    • 159 篇 生物学
    • 128 篇 物理学
    • 88 篇 统计学(可授理学、...
    • 39 篇 化学
    • 37 篇 系统科学
  • 258 篇 管理学
    • 150 篇 管理科学与工程(可...
    • 111 篇 图书情报与档案管...
    • 78 篇 工商管理
  • 102 篇 医学
    • 84 篇 临床医学
    • 72 篇 基础医学(可授医学...
    • 43 篇 公共卫生与预防医...
    • 38 篇 药学(可授医学、理...
  • 46 篇 法学
    • 39 篇 社会学
  • 23 篇 经济学
  • 14 篇 农学
  • 9 篇 教育学
  • 4 篇 艺术学
  • 3 篇 文学
  • 2 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 42 篇 feature extracti...
  • 37 篇 deep learning
  • 37 篇 machine learning
  • 29 篇 semantics
  • 29 篇 training
  • 26 篇 computational mo...
  • 26 篇 accuracy
  • 23 篇 artificial intel...
  • 22 篇 predictive model...
  • 21 篇 reinforcement le...
  • 21 篇 data models
  • 20 篇 deep neural netw...
  • 19 篇 convolutional ne...
  • 17 篇 contrastive lear...
  • 17 篇 federated learni...
  • 16 篇 convolution
  • 15 篇 graph neural net...
  • 13 篇 data mining
  • 13 篇 forecasting
  • 13 篇 robustness

机构

  • 42 篇 school of data a...
  • 41 篇 college of compu...
  • 33 篇 college of compu...
  • 26 篇 nanyang technolo...
  • 25 篇 school of comput...
  • 24 篇 national enginee...
  • 22 篇 school of comput...
  • 21 篇 key laboratory o...
  • 20 篇 school of electr...
  • 19 篇 school of cyber ...
  • 17 篇 shandong provinc...
  • 17 篇 school of cyber ...
  • 16 篇 beijing advanced...
  • 16 篇 key laboratory o...
  • 15 篇 school of comput...
  • 15 篇 national enginee...
  • 15 篇 hubei engineerin...
  • 15 篇 school of inform...
  • 14 篇 hubei key labora...
  • 14 篇 services computi...

作者

  • 68 篇 niyato dusit
  • 22 篇 kang jiawen
  • 20 篇 huang qingming
  • 20 篇 xiong zehui
  • 20 篇 chen mingzhe
  • 20 篇 jin hai
  • 18 篇 yang yang
  • 18 篇 xu qianqian
  • 14 篇 zheng wei-shi
  • 14 篇 shen linlin
  • 13 篇 ezugwu absalom e...
  • 13 篇 yang zhiyong
  • 13 篇 han zhu
  • 13 篇 hai jin
  • 13 篇 du hongyang
  • 13 篇 zhang ruichen
  • 12 篇 hu shengshan
  • 12 篇 zhang leo yu
  • 12 篇 ai bo
  • 11 篇 mahmood khalid

语言

  • 1,190 篇 英文
  • 121 篇 其他
  • 13 篇 中文
检索条件"机构=Unit for Data Science and Computing School of Computer Science and Information"
1321 条 记 录,以下是391-400 订阅
排序:
Detector Collapse: Physical-World Backdooring Object Detection to Catastrophic Overload or Blindness in Autonomous Driving
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Hangtao Hu, Shengshan Wang, Yichen Zhang, Leo Yu Zhou, Ziqi Wang, Xianlong Zhang, Yanjun Chen, Chao School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Cluster and Grid Computing Lab China School of Information and Communication Technology Griffith University Australia University of Technology Sydney Australia RMIT University Australia
Object detection tasks, crucial in safety-critical systems like autonomous driving, focus on pinpointing object locations. These detectors are known to be susceptible to backdoor attacks. However, existing backdoor te... 详细信息
来源: 评论
ECLIPSE: Expunging Clean-label Indiscriminate Poisons via Sparse Diffusion Purification
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Xianlong Hu, Shengshan Zhang, Yechao Zhou, Ziqi Zhang, Leo Yu Xu, Peng Wan, Wei Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Information and Communication Technology Griffith University SouthportQLD4215 Australia
Clean-label indiscriminate poisoning attacks add invisible perturbations to correctly labeled training images, thus dramatically reducing the generalization capability of the victim models. Recently, defense mechanism... 详细信息
来源: 评论
Optimizing Wireless Resource Management and Synchronization in Digital Twin Networks
arXiv
收藏 引用
arXiv 2025年
作者: Yu, Hanzhi Liu, Yuchen Yang, Zhaohui Sun, Haijian Chen, Mingzhe Department of Electrical and Computer Engineering Frost Institute for Data Science and Computing University of Miami Coral GablesFL33146 United States Department of Computer Science North Carolina State University RaleighNC27695 United States College of Information Science and Electronic Engineering Zhejiang University Hangzhou310027 China School of Electrical and Computer Engineering University of Georgia AthensGA30602 United States
In this paper, we investigate an accurate synchronization between a physical network and its digital network twin (DNT), which serves as a virtual representation of the physical network. The considered network include... 详细信息
来源: 评论
One-Time Rewritable Blockchain with Traitor Tracing and Bilateral Access Control
One-Time Rewritable Blockchain with Traitor Tracing and Bila...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Lifeng Guo Huide Lei Wei-Chuen Yau School of Computer and Information Technology Shanxi University Taiyuan China School of Computing and Data Science Xiamen University Malaysia Sepang Selangor Malaysia
One of the solutions for rewriting blockchain data is to replace the standard hash function with a chameleon hash function. This enables users with the trapdoor to generate hash collision for rewriting operation. Howe... 详细信息
来源: 评论
Cooperative Air-Ground Instant Delivery by UAVs and Crowdsourced Taxis
Cooperative Air-Ground Instant Delivery by UAVs and Crowdsou...
收藏 引用
International Conference on data Engineering
作者: Junhui Gao Qianru Wang Xin Zhang Juan Shi Xiang Zhao Qingye Han Yan Pan School of Computer Science Northwestern Polytechnical University School of Computer Science and Technology Xidian University National Key Laboratory of Information Systems Engineering National University of Defense Technology Air Force Engineering University Laboratory for Big Data and Decision National University of Defense Technology School of Management Science and Real Estate Chongqing University National Key Laboratory of Parallel and Distributed Computing National University of Defense Technology
Instant delivery has become a fundamental service in people's daily lives. Different from the traditional express service, the instant delivery has a strict shipping time constraint after being ordered. However, t... 详细信息
来源: 评论
Beam Tracking for High-Speed UAV Via Generative Diffusion Model-Enabled Joint Optimization Approach
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Zhang, Jing Zhang, Chaofeng Feng, Xin Yang, Hongwei Liang, Shuang Sun, Geng Wang, Jiacheng Niyato, Dusit Changchun University of Science and Technology College of Computer Science and Technology Changchun130022 China Jilin University College of Communication Engineering Changchun130012 China Northeast Normal University School of Information Science and Technology Changchun130117 China Jilin University Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Changchun130012 China Jilin University College of Computer Science and Technology Changchun130012 China Nanyang Technological University College of Computing and Data Science 639798 Singapore Nanyang Technological University 639798 Singapore
Beam tracking is crucial for maintaining stable data transmission in unmanned aerial vehicle (UAV) communications. However, a communication link can be disrupted by frequent switching of narrow beams between a base st... 详细信息
来源: 评论
Parallel Dual-Branch Fusion Network for Epileptic Seizure Prediction
收藏 引用
computers in Biology and Medicine 2024年 176卷 108565-108565页
作者: Ma, Hongcheng Wu, Yajing Tang, Yongqiang Chen, Rui Xu, Tao Zhang, Wensheng School of Information and Communication Engineering Hainan University Haikou China State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation Chinese Academy of Sciences Beijing China Shanxi Key Laboratory of Big Data Analysis and Parallel Computing Taiyuan University of Science and Technology Taiyuan China School of Computer Science and Cyber Engineering Guangzhou University Guangzhou China
Epilepsy is a prevalent chronic disorder of the central nervous system. The timely and accurate seizure prediction using the scalp Electroencephalography (EEG) signal can make patients adopt reasonable preventive meas... 详细信息
来源: 评论
Implicit U-KAN2.0: Dynamic, Efficient and Interpretable Medical Image Segmentation
arXiv
收藏 引用
arXiv 2025年
作者: Cheng, Chun-Wun Zhao, Yining Cheng, Yanqi Montoya, Javier Schönlieb, Carola-Bibiane Aviles-Rivero, Angelica I. Department of Applied Mathematics and Theoretical Physics University of Cambridge United Kingdom Siebel School of Computing and Data Science University of Illinois Urbana-Champaign United States Lucerne School of Computer Science and Information Technology Lucerne University of Applied Sciences and Arts United States Yau Mathematical Sciences Center Tsinghua University China
Image segmentation is a fundamental task in both image analysis and medical applications. State-of-the-art methods predominantly rely on encoder-decoder architectures with a U-shaped design, commonly referred to as U-... 详细信息
来源: 评论
A Local Regression-Based SLA-Aware Energy-Efficient Virtual Machine Consolidation Algorithm in data Centers
A Local Regression-Based SLA-Aware Energy-Efficient Virtual ...
收藏 引用
International Conference on Big data computing and Communications (BIGCOM)
作者: Xiaodong Wu Ronghai Wang Guoxin Lin School of Mathmatics and Computer Science Quanzhou Normal University Fujian Provincial Key Laboratory of Data-Intensive Computing Key Laboratory of Intelligent Computing and Information Processing Fujian Province University Fujian Provincial Big Data Research Institute of Intelligent Manufacturing Quanzhou China
Virtual Machine Consolidation (VMC) is an effective means to improve the resource utilization and reduce energy consumption of data centers. However, the VMC optimization that only considers energy consumption may lea...
来源: 评论
GM-DF: Generalized Multi-Scenario Deepfake Detection
arXiv
收藏 引用
arXiv 2024年
作者: Lai, Yingxin Yu, Zitong Yang, Jing Li, Bin Kang, Xiangui Shen, Linlin The School of Computing and Information Technology Great Bay University Dongguan523000 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen University Shenzhen518060 China The Guangdong Key Laboratory of Information Security The School of Computer Science and Engineering Sun Yat-sen University Guangzhou510080 China Computer Vision Institute School of Computer Science & Software Engineering Shenzhen Institute of Artificial Intelligence and Robotics for Society Guangdong Key Laboratory of Intelligent Information Processing National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China
Existing face forgery detection usually follows the paradigm of training models in a single domain, which leads to limited generalization capacity when unseen scenarios and unknown attacks occur. In this paper, we ela... 详细信息
来源: 评论