咨询与建议

限定检索结果

文献类型

  • 2,827 篇 会议
  • 2,669 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 5,510 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,545 篇 工学
    • 2,696 篇 计算机科学与技术...
    • 2,270 篇 软件工程
    • 868 篇 信息与通信工程
    • 615 篇 生物工程
    • 425 篇 控制科学与工程
    • 418 篇 电气工程
    • 398 篇 生物医学工程(可授...
    • 307 篇 光学工程
    • 295 篇 电子科学与技术(可...
    • 227 篇 机械工程
    • 182 篇 化学工程与技术
    • 128 篇 动力工程及工程热...
    • 127 篇 仪器科学与技术
    • 116 篇 建筑学
    • 102 篇 土木工程
  • 1,943 篇 理学
    • 1,037 篇 数学
    • 682 篇 生物学
    • 402 篇 物理学
    • 360 篇 统计学(可授理学、...
    • 204 篇 化学
    • 176 篇 系统科学
  • 1,039 篇 管理学
    • 573 篇 管理科学与工程(可...
    • 506 篇 图书情报与档案管...
    • 244 篇 工商管理
  • 327 篇 医学
    • 282 篇 临床医学
    • 247 篇 基础医学(可授医学...
    • 161 篇 药学(可授医学、理...
    • 121 篇 公共卫生与预防医...
  • 175 篇 法学
    • 144 篇 社会学
  • 100 篇 经济学
    • 100 篇 应用经济学
  • 80 篇 农学
  • 55 篇 教育学
  • 15 篇 军事学
  • 14 篇 文学
  • 7 篇 艺术学

主题

  • 194 篇 semantics
  • 191 篇 training
  • 189 篇 feature extracti...
  • 170 篇 deep learning
  • 133 篇 accuracy
  • 130 篇 computational mo...
  • 128 篇 machine learning
  • 114 篇 data models
  • 104 篇 predictive model...
  • 89 篇 data mining
  • 78 篇 task analysis
  • 77 篇 federated learni...
  • 74 篇 optimization
  • 73 篇 neural networks
  • 70 篇 graph neural net...
  • 68 篇 convolutional ne...
  • 67 篇 forecasting
  • 66 篇 adaptation model...
  • 63 篇 image segmentati...
  • 63 篇 visualization

机构

  • 109 篇 college of compu...
  • 109 篇 national enginee...
  • 102 篇 national enginee...
  • 102 篇 department of el...
  • 102 篇 school of comput...
  • 102 篇 shenzhen researc...
  • 89 篇 school of big da...
  • 86 篇 school of comput...
  • 78 篇 school of comput...
  • 72 篇 school of comput...
  • 71 篇 school of scienc...
  • 69 篇 beijing advanced...
  • 63 篇 guangdong key la...
  • 62 篇 school of comput...
  • 59 篇 peng cheng labor...
  • 58 篇 school of comput...
  • 54 篇 the department o...
  • 53 篇 shandong provinc...
  • 52 篇 shandong enginee...
  • 46 篇 college of big d...

作者

  • 108 篇 zhang rui
  • 95 篇 hai jin
  • 75 篇 jin hai
  • 46 篇 xia yong
  • 45 篇 zhu lipeng
  • 41 篇 li haizhou
  • 40 篇 liu jun
  • 40 篇 shen linlin
  • 34 篇 zhou pan
  • 32 篇 pan jeng-shyang
  • 31 篇 wang shuai
  • 30 篇 wang meng
  • 29 篇 xiaofei liao
  • 29 篇 zhang yanning
  • 28 篇 wu xindong
  • 27 篇 liu yang
  • 26 篇 peng hao
  • 26 篇 li jianxin
  • 24 篇 zhu guangxu
  • 23 篇 xindong wu

语言

  • 4,596 篇 英文
  • 877 篇 其他
  • 56 篇 中文
  • 3 篇 德文
  • 2 篇 法文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Big Data Analytics Computer Science and Engineering"
5510 条 记 录,以下是131-140 订阅
排序:
Accelerating local SGD for non-IID data using variance reduction
收藏 引用
Frontiers of computer science 2023年 第2期17卷 73-89页
作者: Xianfeng LIANG Shuheng SHEN Enhong CHEN Jinchang LIU Qi LIU Yifei CHENG Zhen PAN Anhui Province Key Laboratory of Big Data Analysis and Application University of Science and Technology of ChinaHefei 230027China Ant Financial Services Group Hangzhou 310000China Department of Computer Science and Engineering Hong Kong University of Science and TechnologyHong Kong 999077China
Distributed stochastic gradient descent and its variants have been widely adopted in the training of machine learning models,which apply multiple workers in *** them,local-based algorithms,including Local SGD and FedA... 详细信息
来源: 评论
Wi-SFDAGR: WiFi-Based Cross-Domain Gesture Recognition via Source-Free Domain Adaptation
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 24159-24173页
作者: Yan, Huan Zhang, Xiang Huang, Jinyang Feng, Yuanhao Li, Meng Wang, Anzhi Ou, Weihua Wang, Hongbing Liu, Zhi Guizhou Normal University School of Big Data and Computer Science Guiyang550025 China University of Science and Technology of China CAS Key Laboratory of Electromagnetic Space Information Hefei230026 China Hefei University of Technology School of Computer and Information Hefei230601 China The University of Electro-Communications Department of Computer and Network Engineering Tokyo1828585 Japan
WiFi Channel State Information (CSI)-based gesture recognition offers unique advantages, including cost-effectiveness and enhanced privacy protection, and has garnered significant attention in recent years. However, e... 详细信息
来源: 评论
Towards property-preserving JPEG encryption with structured permutation and adaptive group differentiation
收藏 引用
Visual computer 2024年 第9期40卷 6421-6447页
作者: Su, Guo-Dong Chang, Ching-Chun Lin, Chia-Chen Chang, Chin-Chen School of Big Data and Artificial Intelligence Fujian Polytechnic Normal University Fuzhou350300 China Department of Information Engineering and Computer Science Feng Chia University Taichung40724 Taiwan Fujian Province University Fuzhou China Department of Computer Science and Information Engineering National Chin-Yi University of Technology Taichung41170 Taiwan
The security and privacy of digital images are a major concern in cyberspace. JPEG is the most widely used image compression standard and yet there are problems with format compatibility and file size preservation in ... 详细信息
来源: 评论
An effective compressed image authentication scheme based on N-variant AMBTC
收藏 引用
Multimedia Tools and Applications 2024年 第2期83卷 3801-3829页
作者: Su, Guo-Dong Chang, Chin-Chen Lin, Chia-Chen School of Big Data and Artificial Intelligence Fujian Polytechnic Normal University Fuzhou350300 China Department of Information Engineering and Computer Science Feng Chia University 100 Wenhwa Road Seatwen Taichung40724 Taiwan Department of Computer Science and Information Engineering National Chin-Yi University of Technology Taichung41170 Taiwan
Image authentication is one technique that provides integrity protection for digital images, making them sensitive to any slight modification. Recently, the detectability of absolute moment block truncation coding (AM... 详细信息
来源: 评论
A DL Intrusion Detection Method for Low-Rate Denial of Service Attacks
A DL Intrusion Detection Method for Low-Rate Denial of Servi...
收藏 引用
2023 Asia-Pacific Conference on Image Processing, Electronics and computers, IPEC 2023
作者: Wu, Yuhong Lv, Yunshan Hu, Xiangdong School of Big Data & Computer Science Engineering Chongqing College of Mobile Communication China School of Computer Science and Technology Chongqing University of Posts and Telecommunications Key Laboratory of Public Big Data Security Technology Chongqing Chongqing China School of Big Data & Computer Science Engineering Chongqing College of Mobile Communication Key Laboratory of Public Big Data Security Technology Chongqing China School of Automation Chongqing University of Posts and Telecommunications Chongqing China
Denial of service (DoS) attacks is among the most harmful network threats. Low-rate DoS (LDoS) attacks feature good concealment and are likely to evade detection by conventional signal analysis-based methods. A LDoS a... 详细信息
来源: 评论
Research on a Technology of Mail Anti-virus Gateway for Industrial Internet
Research on a Technology of Mail Anti-virus Gateway for Indu...
收藏 引用
2023 IEEE International Conference on Image Processing and computer Applications, ICIPCA 2023
作者: Wu, Yuhong Lv, Yunshan Zhang, Ling School of Big Data & Computer Science Engineering Chongqing College of Mobile Communication Key Laboratory of Public Big Data Security Technology Chongqing China School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing China
With the rapid rise of the Industrial Internet, emails that convey a large amount of information require a strong network security environment. Aiming at the increasingly complex mail virus prevention and control work... 详细信息
来源: 评论
Two-Stage Incentive Mechanism Based on a Cooperative Mode: A Stackelberg Game Approach
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 24722-24737页
作者: Wang, Long Wang, Yingjie Teng, Haojun Jiao, Xiuzhen Sun, Meimei Yang, Jishen Cai, Zhipeng Yantai University School of Computer and Control Engineering Yantai264005 China China Judicial Big Data Research Institute Co. Ltd China Naval Aviation University China Georgia State University Department of Computer Science AtlantaGA30303 United States
With the explosive growth of mobile data, Mobile Crowd Sensing (MCS) has become a popular paradigm for large-scale data collection. The difficulty of data collection and the gaps in workers’ sensing capabilities are ... 详细信息
来源: 评论
Improved Particle Swarm Algorithm Using Multiple Strategies  1
收藏 引用
14th International Symposium on Intelligence Computation and Applications, ISICA 2023
作者: Yi, Yunfei Wang, Zhiyong Shi, Yunying School of Big Data and Computer Hechi University Guangxi Yizhou546300 China College of Computer Science and Engineering Guangxi Normal University Guangxi Guilin541001 China
In order to address the issues of premature convergence and low search efficiency in the basic particle swarm algorithm, this paper analyzes the improved particle swarm optimization algorithms proposed by previous res... 详细信息
来源: 评论
A Symbolic Rule Integration Framework with Logic Transformer for Inductive Relation Prediction  24
A Symbolic Rule Integration Framework with Logic Transformer...
收藏 引用
33rd ACM Web Conference, WWW 2024
作者: Pan, Yudai Liu, Jun Zhao, Tianzhe Zhang, Lingling Lin, Yun Dong, Jin Song School of Computer Science and Technology Xi'an Jiaotong University Shaanxi Xi'an China National Engineering Lab for Big Data Analytics Xi'an Jiaotong University Shaanxi Xi'an China Shaanxi Provincial Key Laboratory of Big Data Knowledge Engineering Xi'an Jiaotong University Shaanxi Xi'an China Shanghai Jiao Tong University Shanghai China National University of Singapore Singapore Singapore
Relation prediction in knowledge graphs (KGs) aims at predicting missing relations in incomplete triples, whereas the dominant paradigm by KG embeddings has a limitation to predict the relation between unseen entities... 详细信息
来源: 评论
Reversible data hiding scheme using prediction neural network and adaptive modulation mapping
收藏 引用
Multimedia Tools and Applications 2025年 第9期84卷 6665-6686页
作者: Chen, Si-Sheng Chang, Chin-Chen Horng, Ji-Hwei School of Big Data and Artificial Intelligence Fujian Polytechnic Normal University Fujian Fuzhou35030 China Department of Information Engineering and Computer Science Feng Chia University Taichung40724 Taiwan Department of Electrical Engineering National Quemoy University Kinmen89250 Taiwan
Prediction error expansion (PEE) is an attractive approach for reversible data hiding (RDH). The key issue for PEE-based RDH is to improve the prediction accuracy and design a better modulation mapping. This paper pro... 详细信息
来源: 评论