咨询与建议

限定检索结果

文献类型

  • 3,656 篇 会议
  • 2,624 篇 期刊文献
  • 146 篇 学位论文
  • 21 篇 专利
  • 18 册 图书
  • 4 篇 科技报告
  • 1 篇 资讯

馆藏范围

  • 6,469 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 4,419 篇 工学
    • 3,126 篇 计算机科学与技术...
    • 1,362 篇 电气工程
    • 1,337 篇 软件工程
    • 871 篇 信息与通信工程
    • 459 篇 控制科学与工程
    • 302 篇 生物工程
    • 267 篇 电子科学与技术(可...
    • 212 篇 仪器科学与技术
    • 174 篇 机械工程
    • 160 篇 生物医学工程(可授...
    • 136 篇 光学工程
    • 88 篇 动力工程及工程热...
    • 87 篇 材料科学与工程(可...
    • 77 篇 测绘科学与技术
    • 65 篇 化学工程与技术
  • 1,405 篇 理学
    • 532 篇 生物学
    • 471 篇 物理学
    • 408 篇 数学
    • 112 篇 统计学(可授理学、...
    • 97 篇 化学
    • 89 篇 系统科学
    • 77 篇 地球物理学
  • 663 篇 医学
    • 443 篇 临床医学
    • 407 篇 基础医学(可授医学...
    • 80 篇 特种医学
    • 75 篇 医学技术(可授医学...
  • 511 篇 管理学
    • 370 篇 管理科学与工程(可...
    • 150 篇 图书情报与档案管...
    • 63 篇 工商管理
  • 145 篇 教育学
    • 131 篇 心理学(可授教育学...
  • 92 篇 农学
  • 74 篇 法学
  • 32 篇 文学
  • 18 篇 经济学
  • 12 篇 艺术学
  • 8 篇 军事学
  • 2 篇 哲学

主题

  • 1,023 篇 neural networks
  • 431 篇 deep learning
  • 291 篇 training
  • 268 篇 computational mo...
  • 256 篇 artificial neura...
  • 252 篇 neural network
  • 225 篇 machine learning
  • 210 篇 feature extracti...
  • 169 篇 deep neural netw...
  • 166 篇 parallel process...
  • 161 篇 convolutional ne...
  • 156 篇 neurons
  • 144 篇 computer archite...
  • 130 篇 graph neural net...
  • 128 篇 convolutional ne...
  • 126 篇 distributed proc...
  • 123 篇 signal processin...
  • 103 篇 distributed comp...
  • 93 篇 optimization
  • 91 篇 data models

机构

  • 19 篇 univ chinese aca...
  • 15 篇 college of compu...
  • 13 篇 univ penn dept e...
  • 13 篇 tsinghua univ de...
  • 13 篇 science and tech...
  • 12 篇 shandong normal ...
  • 11 篇 chinese acad sci...
  • 11 篇 institute of inf...
  • 11 篇 carnegie mellon ...
  • 11 篇 beijing universi...
  • 10 篇 school of cyber ...
  • 10 篇 peng cheng lab p...
  • 10 篇 natl univ def te...
  • 9 篇 university of sc...
  • 9 篇 jilin univ coll ...
  • 9 篇 国防科技大学
  • 9 篇 univ chinese aca...
  • 9 篇 university of ch...
  • 9 篇 carnegie mellon ...
  • 9 篇 natl univ def te...

作者

  • 17 篇 liu jie
  • 15 篇 li dongsheng
  • 15 篇 wang wei
  • 14 篇 dou yong
  • 13 篇 ribeiro alejandr...
  • 13 篇 jie liu
  • 12 篇 li yue
  • 11 篇 chen xinhai
  • 11 篇 li bo
  • 11 篇 lai zhiquan
  • 10 篇 liu yang
  • 10 篇 zhong tie
  • 10 篇 li jun
  • 10 篇 zhang wei
  • 8 篇 li li
  • 8 篇 behrmann marlene
  • 8 篇 chen li
  • 8 篇 niu xin
  • 8 篇 dong xintong
  • 8 篇 kokkinos yiannis

语言

  • 5,916 篇 英文
  • 358 篇 中文
  • 185 篇 其他
  • 4 篇 日文
  • 2 篇 德文
  • 2 篇 法文
  • 2 篇 斯洛文尼亚文
  • 2 篇 土耳其文
  • 1 篇 西班牙文
  • 1 篇 俄文
检索条件"任意字段=Neural Network and Distributed Processing"
6470 条 记 录,以下是801-810 订阅
排序:
Image stitching tampering detection in social networks  22
Image stitching tampering detection in social networks
收藏 引用
22nd IEEE International Symposium on Parallel and distributed processing with Applications, ISPA 2024
作者: Zhang, Jin Sa, RuLa An, Qi Gao, QiaoMei Pang, Xiliang Yu, Meiju Inner Mongolia University School of Computer Science Hohhot China
Social media, with its immediacy and convenience, has become an important channel for people to exchange information. However, this freedom of information dissemination also provides a breeding ground for the spread o... 详细信息
来源: 评论
TurboMGNN: Improving Concurrent GNN Training Tasks on GPU With Fine-Grained Kernel Fusion
收藏 引用
IEEE TRANSACTIONS ON PARALLEL AND distributed SYSTEMS 2023年 第6期34卷 1968-1981页
作者: Wu, Wenchao Shi, Xuanhua He, Ligang Jin, Hai Huazhong Univ Sci & Technol Natl Engn Res Ctr Big Data Technol & Syst Sch Comp Sci & Technol Serv Comp TechnolCluster & Grid Comp Lab Wuhan 430074 Peoples R China Univ Warwick Dept Comp Sci Coventry CV4 7AL England
Graph neural networks (GNN) have evolved as powerful models for graph representation learning. Many works have been proposed to support GNN training efficiently on GPU. However, these works only focus on a single GNN ... 详细信息
来源: 评论
Ethereum Phishing Detection Using Hyperbolic neural networks and Temporal Information  22
Ethereum Phishing Detection Using Hyperbolic Neural Networks...
收藏 引用
22nd IEEE International Symposium on Parallel and distributed processing with Applications, ISPA 2024
作者: Xu, Rong Zhang, Jun Zhu, Xiaoyue Song, Zhaoxiong Yu, Zhi Inner Mongolia University College of Computer Science Hohhot China Zhejiang University The State Key Laboratory of Blockchain and Data Security Hangzhou China Institute of Computing Technology Chinese Academy of Sciences Beijing China
In recent years, the frequent occurrence of phishing scams on Ethereum has posed serious threats to transaction security and the financial safety of users. This paper proposes an Ethereum phishing scam detection metho... 详细信息
来源: 评论
neural network-based distributed denial of service (DDoS) attack detection in smart home networks
Neural network-based distributed denial of service (DDoS) at...
收藏 引用
6th Smart Cities Symposium (SCS 2022)
作者: I. Ahamed F. Ahamad V. Palade A. Ahamed Centre for Future Transport and Cities Coventry University Coventry UK Centre for Computational Science and Mathematical Modelling Coventry University Coventry UK School of Engineering Canterbury Christ Church University Canterbury UK
Due to various limitations, such as limited power supply, the lack of storage capability and processing power, Internet of Things-based smart home networks have become vulnerable to various cyber-security attacks incl...
来源: 评论
A Point Cloud Video Recognition Acceleration Framework Based on Tempo-Spatial Information
收藏 引用
IEEE TRANSACTIONS ON PARALLEL AND distributed SYSTEMS 2023年 第12期34卷 3224-3237页
作者: Song, Zhuoran Liu, Wanzhen Yang, Tao Liu, Fangxin Jing, Naifeng Liang, Xiaoyao Shanghai Jiao Tong Univ Sch Elect Informat & Elect Engn Shanghai Peoples R China Huawei Technol Co Ltd Shenzhen 518129 Peoples R China
In point cloud video recognition (PVR) tasks, deep neural networks (DNNs) have been widely adopted to enhance accuracy. However, real-time processing is hindered due to the increasing volume of points and frames that ... 详细信息
来源: 评论
Detecting Smart Contract Vulnerabilities based on Fusing Semantic and Syntax Structure Information  22
Detecting Smart Contract Vulnerabilities based on Fusing Sem...
收藏 引用
22nd IEEE International Symposium on Parallel and distributed processing with Applications, ISPA 2024
作者: Gu, Xiguo Duan, Xinhong Ren, Senlin Zhang, Jiale Cui, Zhanqi Beijing Information Science and Technology University School of Computer Science Beijing China
Due to the widespread application and economic value of smart contracts, they have become targets for attackers, leading to significant economic losses from vulnerabilities. Therefore, it is crucial to detect potentia... 详细信息
来源: 评论
PROACTIVE DDoS ATTACKS DETECTION USING DEEP LEARNING TECHNIQUES
PROACTIVE DDoS ATTACKS DETECTION USING DEEP LEARNING TECHNIQ...
收藏 引用
International Conference on Green Energy, Computing and Intelligent Technology 2024, GEn-CITy 2024
作者: Kumar, Gurugubelli Ravi Krishna, Bhukya Ramesh, Choppa Gandhi Institute of Engineering and Technology University Odisha Gunupur India Aditya Institute of Technology and management Andhrapradesh Tekkali India
In this study, present a comprehensive analysis of detecting distributed Denial of Service (DDoS) attacks using advanced deep learning models, including a Deep neural network (DNN), Convolutional neural network (CNN),... 详细信息
来源: 评论
Equipping Federated Graph neural networks with Structure -aware Group Fairness  23
Equipping Federated Graph Neural Networks with Structure -aw...
收藏 引用
23rd IEEE International Conference on Data Mining (IEEE ICDM)
作者: Cui, Nan Wang, Xiuling Wang, Wendy Hui Chen, Violet Ning, Yue Stevens Inst Technol 1 Castle Point Terrace Hoboken NJ 07030 USA
Graph neural networks (GNNs) arc used for graph data processing across various domains. Centralized training of GNNs often faces challenges due to privacy and regulatory issues, making federated learning (FL) a prefer... 详细信息
来源: 评论
Federated Learning Over Coupled Graphs
收藏 引用
IEEE TRANSACTIONS ON PARALLEL AND distributed SYSTEMS 2023年 第4期34卷 1159-1172页
作者: Lei, Runze Wang, Pinghui Zhao, Junzhou Lan, Lin Tao, Jing Deng, Chao Feng, Junlan Wang, Xidian Guan, Xiaohong XianJiaotong Univ MOE Key Lab Intelligent Networks & Network Secur Xian 710049 Shaanxi Peoples R China China Mobile Res Inst Beijing 100875 Peoples R China China Mobile Grp Design Inst Beijing 100080 Peoples R China Tsinghua Univ Ctr Intelligent & Networked Syst Tsinghua Natl Lab Informat Sci & Technol Beijing 100084 Peoples R China
Graphs are widely used to represent the relations among entities. When one owns the complete data, an entire graph can be easily built, therefore performing analysis on the graph is straightforward. However, in many s... 详细信息
来源: 评论
Exploiting Processor Heterogeneity to Improve Throughput and Reduce Latency for Deep neural network Inference  36
Exploiting Processor Heterogeneity to Improve Throughput and...
收藏 引用
36th IEEE International Symposium on Computer Architecture and High-Performance Computing, SBAC-PAD 2024
作者: Beaumont, Olivier David, Jean-Francois Eyraud-Dubois, Lionel Thibault, Samuel Inria Center of the University of Bordeaux Bordeaux France University of Bordeaux Bordeaux France
The growing popularity of Deep neural networks (DNNs) in a variety of domains, including computer vision, natural language processing, and predictive analytics, has led to an increase in the demand for computing resou... 详细信息
来源: 评论