咨询与建议

限定检索结果

文献类型

  • 625 篇 期刊文献
  • 569 篇 会议

馆藏范围

  • 1,194 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 802 篇 工学
    • 592 篇 计算机科学与技术...
    • 486 篇 软件工程
    • 164 篇 信息与通信工程
    • 139 篇 生物工程
    • 85 篇 电气工程
    • 81 篇 控制科学与工程
    • 80 篇 生物医学工程(可授...
    • 68 篇 电子科学与技术(可...
    • 66 篇 光学工程
    • 55 篇 化学工程与技术
    • 44 篇 机械工程
    • 31 篇 动力工程及工程热...
    • 26 篇 交通运输工程
    • 23 篇 建筑学
    • 23 篇 土木工程
    • 22 篇 材料科学与工程(可...
    • 16 篇 仪器科学与技术
  • 429 篇 理学
    • 206 篇 数学
    • 151 篇 生物学
    • 103 篇 物理学
    • 59 篇 化学
    • 59 篇 统计学(可授理学、...
    • 32 篇 系统科学
  • 202 篇 管理学
    • 108 篇 图书情报与档案管...
    • 107 篇 管理科学与工程(可...
    • 31 篇 工商管理
  • 63 篇 医学
    • 57 篇 临床医学
    • 45 篇 基础医学(可授医学...
    • 33 篇 药学(可授医学、理...
  • 35 篇 法学
    • 28 篇 社会学
  • 18 篇 农学
  • 14 篇 经济学
  • 5 篇 教育学
  • 4 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 37 篇 semantics
  • 30 篇 deep learning
  • 28 篇 training
  • 26 篇 feature extracti...
  • 23 篇 machine learning
  • 22 篇 computational mo...
  • 20 篇 task analysis
  • 18 篇 data mining
  • 17 篇 conferences
  • 17 篇 graph neural net...
  • 16 篇 memory managemen...
  • 15 篇 deep neural netw...
  • 15 篇 forecasting
  • 14 篇 object detection
  • 14 篇 neural networks
  • 14 篇 data models
  • 13 篇 convolution
  • 13 篇 accuracy
  • 11 篇 recommender syst...
  • 11 篇 contrastive lear...

机构

  • 100 篇 national enginee...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 39 篇 school of comput...
  • 34 篇 national enginee...
  • 31 篇 hubei engineerin...
  • 29 篇 services computi...
  • 27 篇 cluster and grid...
  • 26 篇 huazhong univers...
  • 26 篇 hubei key labora...
  • 26 篇 zhejiang lab
  • 21 篇 school of comput...
  • 20 篇 school of mathem...
  • 19 篇 school of softwa...
  • 18 篇 national enginee...
  • 17 篇 national univers...
  • 17 篇 smart health big...
  • 16 篇 university of sc...
  • 16 篇 fujian provincia...
  • 16 篇 school of inform...

作者

  • 121 篇 jin hai
  • 118 篇 hai jin
  • 42 篇 xiaofei liao
  • 27 篇 liao xiaofei
  • 26 篇 chen enhong
  • 25 篇 liu jun
  • 23 篇 liu qi
  • 23 篇 hu shengshan
  • 21 篇 haikun liu
  • 19 篇 long zheng
  • 17 篇 zou deqing
  • 16 篇 zhang leo yu
  • 15 篇 deqing zou
  • 15 篇 pan jeng-shyang
  • 15 篇 yu zhang
  • 14 篇 wang meng
  • 14 篇 yu huang
  • 13 篇 jiang xiao
  • 13 篇 li chen
  • 13 篇 wu xindong

语言

  • 1,127 篇 英文
  • 57 篇 其他
  • 11 篇 中文
检索条件"机构=Anhui Engineering Lab of Big Data Technology"
1194 条 记 录,以下是351-360 订阅
排序:
SharDAG: Scaling DAG-Based Blockchains Via Adaptive Sharding
SharDAG: Scaling DAG-Based Blockchains Via Adaptive Sharding
收藏 引用
International Conference on data engineering
作者: Feng Cheng Jiang Xiao Cunyang Liu Shijie Zhang Yifan Zhou Bo Li Baochun Li Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China Hong Kong University of Science and Technology Hong Kong University of Toronto Canada
Directed Acyclic Graph (DAG)-based blockchain (a.k.a distributed ledger) has become prevalent for supporting highly concurrent applications. Its inherent parallel data structure accelerates block generation significan... 详细信息
来源: 评论
Backdoor Defense via Deconfounded Representation Learning
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Zaixi Liu, Qi Wang, Zhicai Lu, Zepu Hu, Qingyong Anhui Province Key Lab of Big Data Analysis and Application School of Computer Science and Technology University of Science and Technology of China China State Key Laboratory of Cognitive Intelligence Anhui Hefei China Hong Kong University of Science and Technology Hong Kong University of Science and Technology of China China
Deep neural networks (DNNs) are recently shown to be vulnerable to backdoor attacks, where attackers embed hidden backdoors in the DNN model by injecting a few poisoned examples into the training dataset. While extens... 详细信息
来源: 评论
Research on Leak Location Method of Water Supply Network based on Deep Neural Network Model
Research on Leak Location Method of Water Supply Network bas...
收藏 引用
第四届材料科学应用与能源材料国际研讨会
作者: Xiaoxuan Wu Chen Zhang School of Artificial Intelligence and Big Data Hefei University Anhui Engineering Lab of Big Data Technology Application for Urban Infrastructure Hefei University
The water supply network is one of the important infrastructure in urban construction. It has strong theoretical and practical significance to realize the real-time monitoring and leak location of the water supply net... 详细信息
来源: 评论
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
Detecting Backdoors During the Inference Stage Based on Corr...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Xiaogeng Liu Minghui Li Haoyu Wang Shengshan Hu Dengpan Ye Hai Jin Libing Wu Chaowei Xiao School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Software Engineering Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan University School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab Arizona State University
Deep neural networks are proven to be vulnerable to backdoor attacks. Detecting the trigger samples during the inference stage, i.e., the test-time trigger sample detection, can prevent the backdoor from being trigger...
来源: 评论
Efficient FPGA-based graph processing with hybrid pull-push computational model
收藏 引用
Frontiers of Computer Science 2020年 第4期14卷 13-28页
作者: Chengbo YANG Long ZHENG Chuangyi GUI Hai JIN National Engineering Research Center for Big Data Technology and System/Service Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan430074China
Hybrid pull-push computational model can provide compelling results over either of single one for processing real-world *** and pipeline parallelism of FPGAs make it potential to process different stages of graph ***,... 详细信息
来源: 评论
Dfier: A Directed Vulnerability Verifier for Ethereum Smart Contracts
SSRN
收藏 引用
SSRN 2023年
作者: Wang, Zeli Dai, Weiqi Li, Ming Choo, Kim-Kwang Raymond Zou, Deqing Chongqing Key Laboratory of Computational Intelligence Key Laboratory of Big Data Intelligent Computing Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education College of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing40065 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio United States
Existing smart contract vulnerability identification approaches mainly focus on complete program detection. Consequently, lots of known potentially vulnerable locations need manual verification, which is energy-exhaus... 详细信息
来源: 评论
Towards Efficient data-Centric Robust Machine Learning with Noise-based Augmentation
arXiv
收藏 引用
arXiv 2022年
作者: Liu, Xiaogeng Wang, Haoyu Zhang, Yechao Wu, Fangzhou Hu, Shengshan School Of Cyber Science And Engineering National Engineering Research Center For Big Data Technology And System Services Computing Technology And System Lab Hubei Engineering Research Center On Big Data Security Huazhong University Of Science And Technology Wuhan430074 China
The data-centric machine learning aims to find effective ways to build appropriate datasets which can improve the performance of AI models. In this paper, we mainly focus on designing an efficient data-centric scheme ... 详细信息
来源: 评论
Animal Behavior Monitoring Based on Sequence to Sequence Model  22
Animal Behavior Monitoring Based on Sequence to Sequence Mod...
收藏 引用
22nd International Conference on Wavelet Analysis and Pattern Recognition, ICWAPR 2024
作者: Cui, Qing-Zhe Yuan, Xin Partoon, Justine Whittaker, Alexandra L. Xu, Li-Xiang Liu, Lei Shi, Peng School of Computer Engineering and Science Shanghai University Shanghai200444 China College of Artificial Intelligence and Big Data Hefei University Hefei230041 China School of Electrical and Mechanical Engineering The University of Adelaide AdelaideSA5005 Australia Zoos South Australia AdelaideSA5000 Australia School of Animal and Veterinary Sciences The University of Adelaide AdelaideSA5005 Australia Anhui Jiaoxin Technology Co. Ltd. No.77 Wutaishan Road Hefei230041 China
Object tracking is a core task in the field of computer vision, with wide-ranging applications in scenarios such as video surveillance and autonomous driving. This paper focuses on the application of the SeqTrack meth... 详细信息
来源: 评论
A Scalable, Efficient, and Robust Dynamic Memory Management Library for HLS-based FPGAs
A Scalable, Efficient, and Robust Dynamic Memory Management ...
收藏 引用
IEEE/ACM International Symposium on Microarchitecture (MICRO)
作者: Qinggang Wang Long Zheng Zhaozeng An Shuyi Xiong Runze Wang Yu Huang Pengcheng Yao Xiaofei Liao Hai Jin Jingling Xue National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Zhejiang Lab Hangzhou China School of Computer Science and Engineering University of New South Wales Sydney NSW Australia
Nowadays, high-level synthesis (HLS) has gained prominence for FPGA-based architecture prototyping, enhancing productivity significantly. Despite this advancement, HLS tools are impeded by a critical drawback: they la...
来源: 评论
Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensional Input Spaces
Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensiona...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Haoxiang Jia Ming Wen Zifan Xie Xiaochen Guo Rongxin Wu Maolin Sun Kang Chen Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Services Computing Technology and System Lab Cluster and Grid Computing Lab. Hubei Engineering Research Center on Big Data Security National Engineering Research Center for Big Data Technology and System School of Informatics Xiamen University China School of Computer Science and Technology Huazhong University of Science and Technology China
Java Virtual Machine (JVM) is the fundamental software system that supports the interpretation and execution of Java bytecode. To support the surging performance demands for the increasingly complex and large-scale Ja...
来源: 评论