咨询与建议

限定检索结果

文献类型

  • 620 篇 期刊文献
  • 569 篇 会议

馆藏范围

  • 1,189 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 798 篇 工学
    • 590 篇 计算机科学与技术...
    • 485 篇 软件工程
    • 163 篇 信息与通信工程
    • 139 篇 生物工程
    • 84 篇 电气工程
    • 81 篇 控制科学与工程
    • 80 篇 生物医学工程(可授...
    • 67 篇 电子科学与技术(可...
    • 66 篇 光学工程
    • 54 篇 化学工程与技术
    • 44 篇 机械工程
    • 31 篇 动力工程及工程热...
    • 26 篇 交通运输工程
    • 23 篇 建筑学
    • 23 篇 土木工程
    • 21 篇 材料科学与工程(可...
    • 16 篇 仪器科学与技术
  • 428 篇 理学
    • 206 篇 数学
    • 151 篇 生物学
    • 102 篇 物理学
    • 59 篇 化学
    • 59 篇 统计学(可授理学、...
    • 32 篇 系统科学
  • 202 篇 管理学
    • 108 篇 图书情报与档案管...
    • 107 篇 管理科学与工程(可...
    • 31 篇 工商管理
  • 62 篇 医学
    • 57 篇 临床医学
    • 44 篇 基础医学(可授医学...
    • 33 篇 药学(可授医学、理...
  • 35 篇 法学
    • 28 篇 社会学
  • 18 篇 农学
  • 14 篇 经济学
  • 5 篇 教育学
  • 4 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 37 篇 semantics
  • 30 篇 deep learning
  • 28 篇 training
  • 26 篇 feature extracti...
  • 23 篇 machine learning
  • 22 篇 computational mo...
  • 20 篇 task analysis
  • 18 篇 data mining
  • 17 篇 conferences
  • 17 篇 graph neural net...
  • 16 篇 memory managemen...
  • 15 篇 deep neural netw...
  • 15 篇 forecasting
  • 14 篇 object detection
  • 14 篇 neural networks
  • 14 篇 data models
  • 13 篇 convolution
  • 13 篇 accuracy
  • 11 篇 recommender syst...
  • 11 篇 contrastive lear...

机构

  • 100 篇 national enginee...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 38 篇 school of comput...
  • 34 篇 national enginee...
  • 31 篇 hubei engineerin...
  • 29 篇 services computi...
  • 27 篇 cluster and grid...
  • 26 篇 huazhong univers...
  • 26 篇 hubei key labora...
  • 26 篇 zhejiang lab
  • 21 篇 school of comput...
  • 20 篇 school of mathem...
  • 19 篇 school of softwa...
  • 18 篇 national enginee...
  • 17 篇 national univers...
  • 17 篇 smart health big...
  • 16 篇 university of sc...
  • 16 篇 fujian provincia...
  • 16 篇 school of inform...

作者

  • 121 篇 jin hai
  • 118 篇 hai jin
  • 42 篇 xiaofei liao
  • 27 篇 liao xiaofei
  • 26 篇 chen enhong
  • 25 篇 liu jun
  • 23 篇 liu qi
  • 23 篇 hu shengshan
  • 21 篇 haikun liu
  • 19 篇 long zheng
  • 17 篇 zou deqing
  • 16 篇 zhang leo yu
  • 15 篇 deqing zou
  • 15 篇 pan jeng-shyang
  • 15 篇 yu zhang
  • 14 篇 wang meng
  • 14 篇 yu huang
  • 13 篇 jiang xiao
  • 13 篇 li chen
  • 13 篇 li minghui

语言

  • 1,122 篇 英文
  • 57 篇 其他
  • 11 篇 中文
检索条件"机构=Anhui Engineering Lab of Big Data Technology"
1189 条 记 录,以下是491-500 订阅
排序:
Suppress Content Shift: Better Diffusion Features via Off-the-Shelf Generation Techniques  38
Suppress Content Shift: Better Diffusion Features via Off-th...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Meng, Benyuan Xu, Qianqian Wang, Zitai Yang, Zhiyong Cao, Xiaochun Huang, Qingming Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China Peng Cheng Laboratory China School of Computer Science and Tech. University of Chinese Academy of Sciences China School of Cyber Science and Tech. Shenzhen Campus of Sun Yat-sen University China Key Laboratory of Big Data Mining and Knowledge Management CAS China
Diffusion models are powerful generative models, and this capability can also be applied to discrimination. The inner activations of a pre-trained diffusion model can serve as features for discriminative tasks, namely...
来源: 评论
Not All Diffusion Model Activations Have Been Evaluated as Discriminative Features  38
Not All Diffusion Model Activations Have Been Evaluated as D...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Meng, Benyuan Xu, Qianqian Wang, Zitai Cao, Xiaochun Huang, Qingming Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China Peng Cheng Laboratory China School of Cyber Science and Tech. Shenzhen Campus of Sun Yat-sen University China School of Computer Science and Tech. University of Chinese Academy of Sciences China Key Laboratory of Big Data Mining and Knowledge Management CAS China
Diffusion models are initially designed for image generation. Recent research shows that the internal signals within their backbones, named activations, can also serve as dense features for various discriminative task...
来源: 评论
Global Green Digital Economy: Challenges and Development: Preface for ITQM 2022
收藏 引用
Procedia Computer Science 2022年 第C期214卷 1-3页
作者: Shi, Yong Li, Jianping Kou, Gang Berg, Daniel Tien, James College of Information Science and Technology University of Nebraska at Omaha OmahaNE68182 United States Research Centre on Fictitious Economy and Data Science Chinese Academy of Sciences Beijing100190 China Key Lab of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing100190 China School of Economics and Management University of Chinese Academy of Sciences Beijing100190 China School of Business Administration Southwestern University of Finance and Economics Chengdu611130 China College of Engineering University of Miami Coral GablesFL33124 United States
来源: 评论
Temporal Knowledge Graph Reasoning via Time-Distributed Representation Learning
Temporal Knowledge Graph Reasoning via Time-Distributed Repr...
收藏 引用
IEEE International Conference on data Mining (ICDM)
作者: Kangzheng Liu Feng Zhao Guandong Xu Xianzhi Wang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Data Science and Machine Intelligence Lab University of Technology Sydney Sydney Australia
Temporal knowledge graph (TKG) reasoning has attracted significant attention. Recent approaches for modeling historical information have led to great advances. However, the problems of time variability and unseen enti... 详细信息
来源: 评论
SMS Spam Detection Using BERT and Multi-Graph Convolutional Networks
SSRN
收藏 引用
SSRN 2025年
作者: Shen, Linjie Wang, Yanbin Li, Zhao Ma, Wenrui School of Computer Science and Technology Zhejiang Gongshang University Zhejiang Hangzhou China Department of Engineering Shenzhen MSU-BIT University Guangdong Shenzhen518172 China Zhejiang Lab Zhejiang Hangzhou China Department of Big Data and Future E-Commerce Technology Zhejiang Key Laboratory Zhejiang Hangzhou China
The surge in smartphone usage has significantly increased SMS traffic and, consequently, SMS spam, posing risks such as phishing, financial losses, and privacy breaches. Traditional rule-based and blacklist methods fa... 详细信息
来源: 评论
Design and Simulation of Multi-tiered Heterogeneous Memory Architecture
Design and Simulation of Multi-tiered Heterogeneous Memory A...
收藏 引用
International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS)
作者: Jinyuan Hu Haikun Liu Hai Jin Xiaofei Liao National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Heterogeneous memory systems have become increasingly popular in recent years. Because heterogeneous storage media often show significantly different characteristics in terms of bandwidth, latency, capacity, and energ... 详细信息
来源: 评论
Container Anomaly Detection System Based on Rule Mining and Matching
Container Anomaly Detection System Based on Rule Mining and ...
收藏 引用
2022 International Conference on Blockchain technology and Information Security, ICBCTIS 2022
作者: Yu, Daisong Xie, Yulai Long, Huachao Jin, Minpeng Li, Xuan School of Cyber Science and Engineering Hubei Engineering Research Center on Big Data Security Huazhong University of Science and Technology Wuhan China Wuhan National Lab for Optoelectronics F311 Wuhan China School of Computer Science Huazhong University of Science and Technology Wuhan China Nsfocus Inc. A9-3/F Optical Valley Software Park Wuhan China
Compared with virtual machine technology, container technology is more and more popular by virtue of its excellent convenience and reliable security isolation. Containers will encounter various anomalies during operat... 详细信息
来源: 评论
Variational Bayes for Federated Continual Learning
arXiv
收藏 引用
arXiv 2024年
作者: Yao, Dezhong Li, Sanmu Dai, Yutong Xu, Zhiqiang Hu, Shengshan Zhao, Peilin Sun, Lichao The National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab. Cluster and Grid Computing Lab. School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Lehigh University PA18015 United States Mohamed bin Zayed University of Artificial Intelligence United Arab Emirates Tencent AI Lab. Shenzhen China
Federated continual learning (FCL) has received increasing attention due to its potential in handling real-world streaming data, characterized by evolving data distributions and varying client classes over time. The c... 详细信息
来源: 评论
CPSAA: Accelerating Sparse Attention using Crossbar-based Processing-In-Memory Architecture
arXiv
收藏 引用
arXiv 2022年
作者: Li, Huize Jin, Hai Zheng, Long Liao, Xiaofei Huang, Yu Liu, Cong Xu, Jiahong Duan, Zhuohui Chen, Dan Gui, Chuangyi National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
The attention-based neural network attracts great interest due to its excellent accuracy enhancement. However, the attention mechanism requires huge computational efforts to process unnecessary calculations, significa... 详细信息
来源: 评论
An efficient face recognition attack method based on generative adversarial networks and cosine metrics  5
An efficient face recognition attack method based on generat...
收藏 引用
5th Asian Conference on Artificial Intelligence technology, ACAIT 2021
作者: Ding, Hu He, Shumeng Wu, Yanwen Jin, Yongli Gan, Lin Xu, Gaodi Yang, Houqun Hainan University School of Computer Science and Technology Hainan Haikou China Chongqing University School of Big Data and Software Engineering Chongqing China Anhui University School of Computer Science and Technology Anhui Hefei China Purdue University Elmore Family School of Computer and Electrical Engineering West Lafayette United States Hainan Association for Artificial Intelligence Hainan Haikou China
Deep neural networks are vulnerable to attacks on adversarial samples. These attacks are caused by adding small magnitude perturbations to the input samples, which may lead to misclassification of the deep neural netw... 详细信息
来源: 评论