咨询与建议

限定检索结果

文献类型

  • 626 篇 期刊文献
  • 580 篇 会议

馆藏范围

  • 1,206 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 815 篇 工学
    • 606 篇 计算机科学与技术...
    • 490 篇 软件工程
    • 164 篇 信息与通信工程
    • 139 篇 生物工程
    • 95 篇 控制科学与工程
    • 86 篇 电气工程
    • 80 篇 生物医学工程(可授...
    • 69 篇 电子科学与技术(可...
    • 66 篇 光学工程
    • 54 篇 化学工程与技术
    • 44 篇 机械工程
    • 31 篇 动力工程及工程热...
    • 27 篇 交通运输工程
    • 23 篇 建筑学
    • 23 篇 土木工程
    • 21 篇 材料科学与工程(可...
    • 17 篇 安全科学与工程
  • 429 篇 理学
    • 207 篇 数学
    • 151 篇 生物学
    • 102 篇 物理学
    • 59 篇 化学
    • 59 篇 统计学(可授理学、...
    • 32 篇 系统科学
  • 203 篇 管理学
    • 108 篇 图书情报与档案管...
    • 107 篇 管理科学与工程(可...
    • 32 篇 工商管理
  • 65 篇 医学
    • 59 篇 临床医学
    • 45 篇 基础医学(可授医学...
    • 33 篇 药学(可授医学、理...
  • 35 篇 法学
    • 28 篇 社会学
  • 18 篇 农学
  • 14 篇 经济学
  • 5 篇 教育学
  • 4 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 37 篇 semantics
  • 31 篇 deep learning
  • 29 篇 training
  • 26 篇 feature extracti...
  • 23 篇 machine learning
  • 22 篇 computational mo...
  • 20 篇 task analysis
  • 18 篇 data mining
  • 18 篇 graph neural net...
  • 17 篇 conferences
  • 16 篇 deep neural netw...
  • 16 篇 memory managemen...
  • 15 篇 forecasting
  • 14 篇 object detection
  • 14 篇 neural networks
  • 14 篇 convolution
  • 14 篇 data models
  • 13 篇 accuracy
  • 12 篇 recommender syst...
  • 11 篇 contrastive lear...

机构

  • 103 篇 national enginee...
  • 55 篇 school of comput...
  • 53 篇 school of cyber ...
  • 38 篇 school of comput...
  • 37 篇 national enginee...
  • 33 篇 hubei engineerin...
  • 32 篇 services computi...
  • 29 篇 cluster and grid...
  • 28 篇 hubei key labora...
  • 26 篇 huazhong univers...
  • 26 篇 zhejiang lab
  • 21 篇 school of comput...
  • 21 篇 school of softwa...
  • 20 篇 school of mathem...
  • 18 篇 national enginee...
  • 17 篇 national univers...
  • 17 篇 smart health big...
  • 17 篇 school of inform...
  • 16 篇 university of sc...
  • 16 篇 fujian provincia...

作者

  • 124 篇 jin hai
  • 118 篇 hai jin
  • 42 篇 xiaofei liao
  • 28 篇 liu jun
  • 28 篇 liao xiaofei
  • 27 篇 chen enhong
  • 25 篇 hu shengshan
  • 23 篇 liu qi
  • 21 篇 haikun liu
  • 19 篇 long zheng
  • 17 篇 zou deqing
  • 17 篇 zhang leo yu
  • 15 篇 deqing zou
  • 15 篇 pan jeng-shyang
  • 15 篇 yu zhang
  • 14 篇 wang meng
  • 14 篇 zhou ziqi
  • 14 篇 yu huang
  • 14 篇 li minghui
  • 13 篇 jiang xiao

语言

  • 1,107 篇 英文
  • 89 篇 其他
  • 11 篇 中文
检索条件"机构=Anhui Engineering Lab of Big Data Technology"
1206 条 记 录,以下是681-690 订阅
排序:
A Solution to Sensor Node Localization Using Glow-Worm Swarm Optimization Hybridizing Positioning Model  16th
A Solution to Sensor Node Localization Using Glow-Worm Swarm...
收藏 引用
16th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2020 in conjunction with the 13th International Conference on Frontiers of Information technology, Applications and Tools, FITAT 2020
作者: Nguyen, Trong-The Yu, Jie Nguyen, Thi-Thanh-Tan Dao, Thi-Kien Ngo, Truong-Giang Fujian Provincial Key Lab of Big-Data-Mining and Applications Fujian University of Technology Fujian350118 China College of Mechanical and Automotive Engineering Fujian University of Technology Fuzhou350118 China Information Technology Faculty Electric Power University Hanoi Viet Nam Faculty of Computer Science and Engineering Thuyloi-University 175 Tay Son Dong-Da Hanoi Viet Nam University of Management and Technology Haiphong180000 Viet Nam
The sensor node localization is related to the NP-hard problem due to the complicated determination of the actual coordinate of the sensor node. The metaheuristic algorithms considered as computational intelligence ap... 详细信息
来源: 评论
Cross-Language Binary-Source Code Matching with Intermediate Representations
arXiv
收藏 引用
arXiv 2022年
作者: Gui, Yi Wan, Yao Zhang, Hongyu Huang, Huifang Sui, Yulei Xu, Guandong Shao, Zhiyuan Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China The University of Newcastle Australia School of Mathematics and Statistics Huazhong University of Science and Technology Wuhan China School of Computer Science University of Technology Sydney Australia
Binary-source code matching plays an important role in many security and software engineering related tasks such as malware detection, reverse engineering and vulnerability assessment. Currently, several approaches ha... 详细信息
来源: 评论
Logiformer: A Two-Branch Graph Transformer Network for Interpretable Logical Reasoning
arXiv
收藏 引用
arXiv 2022年
作者: Xu, Fangzhi Liu, Jun Lin, Qika Pan, Yudai Zhang, Lingling School of Computer Science and Technology Xi'an Jiaotong University Xi'an China Shaanxi Province Key Laboratory of Satellite and Terrestrial Network Tech. R&d National Engineering Lab for Big Data Analytics Xi'an China
Machine reading comprehension has aroused wide concerns, since it explores the potential of model for text understanding. To further equip the machine with the reasoning capability, the challenging task of logical rea... 详细信息
来源: 评论
Automatically derived stateful network functions including non-field attributes
Automatically derived stateful network functions including n...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Bin Yuan Shengyao Sun Xianjun Deng Deqing Zou Haoyu Chen Shenghui Li Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Shenzhen Research Institute Huazhong University of Science and Technology Shenzhen China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Cluster and Grid Computing Lab
The modern network consists of thousands of network devices from different suppliers that perform distinct code-pendent functions, such as routing, switching, modifying header fields, and access control across physica... 详细信息
来源: 评论
Contrastive Learning for Robust Android Malware Familial Classification
arXiv
收藏 引用
arXiv 2021年
作者: Wu, Yueming Dou, Shihan Zou, Deqing Yang, Wei Qiang, Weizhong Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University Shanghai200433 China University of Texas at Dallas Dallas United States National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Due to its open-source nature, Android operating system has been the main target of attackers to exploit. Malware creators always perform different code obfuscations on their apps to hide malicious activities. Feature... 详细信息
来源: 评论
Intelligent thermostatic cold storage design strategies based on Monte Carlo and graph neural networks
Intelligent thermostatic cold storage design strategies base...
收藏 引用
Computer Vision, Image and Deep Learning (CVIDL), International Conference on
作者: Kaichen Ouyang Chang Liu Minyu Qiu Zixin Wang TianXiang Xu University of Science and Technology of China school of mathematical science Hefei Anhui China Chinese Health Medical Information and Big Data Association-Information and Application Security Agency Beijing China China Jiliang University Information Engineering College Hangzhou Zhejiang China Beijing Normal University HoncKong Baptist University Unitednternational College Zhuhai Guangdong China University of Jinan School of Information Science and Engineering Jinan Shandong China
We first introduce four annular lattice systems with periodic boundaries as the basic model of a cold storage cooler. The four annular lattice systems represent the four subsystems of the refrigeration system and are ...
来源: 评论
Secondary Access Class Barring for Machine Type Communications with PUSCH Resource Constraints
Secondary Access Class Barring for Machine Type Communicatio...
收藏 引用
IEEE Conference on Vehicular technology (VTC)
作者: Yuxuan Wen Liu Yang Chaoyuan Bai Heng Liu Communication and Sensor Network for Modern Transportation International Cooperation Center(CSNMT) Southwest Jiaotong University Chengdu P.R.China Key Lab of Information Coding & Transmission Institude of Mobile Communication Southwest Jiaotong University Chengdu P.R.China National Engineering Laboratory of Integrated Transportation Big Data Application Technology Chengdu P.R.China
With the continuous increase of IoT devices, multiple devices desire to use network resources simultaneously during peak hours and overload conditions, leading to collisions and a reduction in the network’s effective... 详细信息
来源: 评论
Attention in Attention: Modeling Context Correlation for Efficient Video Classification
arXiv
收藏 引用
arXiv 2022年
作者: Hao, Yanbin Wang, Shuo Cao, Pei Gao, Xinjian Xu, Tong Wu, Jinmeng He, Xiangnan The CCCD Key Lab of Ministry of Culture and Tourism School of Data Science School of Information Science and Technology University of Science and Technology of China Anhui 230026 China The Wuhan Research Institute of Posts and Telecommunications Hubei Wuhan430205 China The School of Computer Science and Information Engineering School of Artificial Intelligence Hefei University of Technology Anhui 230009 China The School of Data Science School of Computer Science and Technology University of Science and Technology of China Anhui 230026 China The Hubei Key Laboratory of Optical Information and Pattern Recognition Wuhan Institute of Technology Hubei Wuhan430070 China
Attention mechanisms have significantly boosted the performance of video classification neural networks thanks to the utilization of perspective contexts. However, the current research on video attention generally foc... 详细信息
来源: 评论
Analysis and Improvement of Otway-Rees Based on Enhanced Authentication Tests
收藏 引用
International Journal of Network Security 2021年 第3期23卷 426-435页
作者: Yu, Lei Guo, Yu-Yan Zhuo, Ze-Peng Wei, Shi-Min School of Computer Science and Technology Huaibei Normal Universtiy School of Information and Control Engineering China University of Mining and Technology School of Mathematical Sciences Huaibei Normal University Anhui Big-Data Research Center on University Management Anhui Huaibei235000 China
To improve the formalization and accuracy of enhanced authentication tests and the effectiveness of security protocol analysis and improvement, the theory and methods of authentication tests are extended and optimized... 详细信息
来源: 评论
Group-Level Cognitive Diagnosis: A Multi-Task Learning Perspective
Group-Level Cognitive Diagnosis: A Multi-Task Learning Persp...
收藏 引用
IEEE International Conference on data Mining (ICDM)
作者: Jie Huang Qi Liu Fei Wang Zhenya Huang Songtao Fang Runze Wu Enhong Chen Yu Su Shijin Wang Anhui Province Key Laboratory of Big Data Analysis and Application School of Computer Science and Technology University of Science and Technology of China Fuxi AI Lab NetEase Inc. Hangzhou China IFLYTEK Research
Most cognitive diagnosis research in education has been concentrated on individual assessment, aiming at discovering the latent characteristics of students. However, in many real-world scenarios, group-level assessmen... 详细信息
来源: 评论