咨询与建议

限定检索结果

文献类型

  • 2,861 篇 会议
  • 2,717 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 5,592 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,611 篇 工学
    • 2,749 篇 计算机科学与技术...
    • 2,298 篇 软件工程
    • 895 篇 信息与通信工程
    • 618 篇 生物工程
    • 456 篇 控制科学与工程
    • 455 篇 电气工程
    • 403 篇 生物医学工程(可授...
    • 310 篇 光学工程
    • 302 篇 电子科学与技术(可...
    • 235 篇 机械工程
    • 183 篇 化学工程与技术
    • 133 篇 仪器科学与技术
    • 133 篇 动力工程及工程热...
    • 119 篇 建筑学
    • 109 篇 网络空间安全
    • 105 篇 土木工程
  • 1,972 篇 理学
    • 1,045 篇 数学
    • 686 篇 生物学
    • 411 篇 物理学
    • 358 篇 统计学(可授理学、...
    • 213 篇 化学
    • 176 篇 系统科学
  • 1,063 篇 管理学
    • 590 篇 管理科学与工程(可...
    • 516 篇 图书情报与档案管...
    • 247 篇 工商管理
  • 343 篇 医学
    • 294 篇 临床医学
    • 253 篇 基础医学(可授医学...
    • 163 篇 药学(可授医学、理...
    • 132 篇 公共卫生与预防医...
  • 176 篇 法学
    • 145 篇 社会学
  • 102 篇 经济学
  • 81 篇 农学
  • 60 篇 教育学
  • 15 篇 军事学
  • 14 篇 文学
  • 7 篇 艺术学

主题

  • 197 篇 semantics
  • 192 篇 feature extracti...
  • 192 篇 training
  • 173 篇 deep learning
  • 136 篇 accuracy
  • 132 篇 computational mo...
  • 131 篇 machine learning
  • 116 篇 data models
  • 104 篇 predictive model...
  • 92 篇 data mining
  • 79 篇 federated learni...
  • 78 篇 task analysis
  • 76 篇 optimization
  • 73 篇 neural networks
  • 70 篇 graph neural net...
  • 70 篇 convolutional ne...
  • 68 篇 forecasting
  • 68 篇 adaptation model...
  • 64 篇 image segmentati...
  • 63 篇 visualization

机构

  • 112 篇 college of compu...
  • 110 篇 national enginee...
  • 104 篇 department of el...
  • 102 篇 national enginee...
  • 102 篇 school of comput...
  • 101 篇 shenzhen researc...
  • 92 篇 school of big da...
  • 86 篇 school of comput...
  • 79 篇 school of comput...
  • 73 篇 school of comput...
  • 73 篇 school of scienc...
  • 69 篇 beijing advanced...
  • 63 篇 guangdong key la...
  • 62 篇 school of comput...
  • 59 篇 peng cheng labor...
  • 58 篇 school of comput...
  • 53 篇 shandong provinc...
  • 52 篇 shandong enginee...
  • 52 篇 the department o...
  • 47 篇 college of big d...

作者

  • 110 篇 zhang rui
  • 95 篇 hai jin
  • 74 篇 jin hai
  • 46 篇 xia yong
  • 44 篇 zhu lipeng
  • 42 篇 li haizhou
  • 41 篇 liu jun
  • 40 篇 shen linlin
  • 34 篇 zhou pan
  • 32 篇 pan jeng-shyang
  • 31 篇 wang shuai
  • 30 篇 wang meng
  • 29 篇 xiaofei liao
  • 29 篇 zhang yanning
  • 27 篇 liu yang
  • 27 篇 wu xindong
  • 26 篇 peng hao
  • 26 篇 li jianxin
  • 24 篇 zhu guangxu
  • 23 篇 zhang hongyu

语言

  • 4,329 篇 英文
  • 1,228 篇 其他
  • 58 篇 中文
  • 3 篇 德文
  • 2 篇 法文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Big Data Analytics Computer Science and Engineering"
5592 条 记 录,以下是141-150 订阅
排序:
Joint Deployment of UAV and Edge Server In Edge Computing
Joint Deployment of UAV and Edge Server In Edge Computing
收藏 引用
2025 IEEE Wireless Communications and Networking Conference, WCNC 2025
作者: Huang, Wei Zhang, Deyu Luo, Wei Tang, Yin School of Computer Science and Engineering Central South University Changsha410083 China Big Data Institute Central South University Changsha410083 China
Edge server placement is a hot issue in mobile edge computing. It is a key prerequisite for deploying edge servers that can meet computing needs and improve resource utilization. This paper studies the joint location ... 详细信息
来源: 评论
Statistical Model-driven Similarity Hashing: Bridging Modalities for Efficient Unsupervised Retrieval  39
Statistical Model-driven Similarity Hashing: Bridging Modali...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Kuai, Mingjin Long, Jun Yang, Zhan School of Computer Science and Engineering Central South University Changsha410083 China Big Data Institute Central South University Changsha410083 China
Unsupervised deep cross-modal hash retrieval aims to map multi-modal features into binary hash codes without labels, which is of interest due to its storage efficiency, query speed and convenient applications. However...
来源: 评论
Towards property-preserving JPEG encryption with structured permutation and adaptive group differentiation
收藏 引用
Visual computer 2024年 第9期40卷 6421-6447页
作者: Su, Guo-Dong Chang, Ching-Chun Lin, Chia-Chen Chang, Chin-Chen School of Big Data and Artificial Intelligence Fujian Polytechnic Normal University Fuzhou350300 China Department of Information Engineering and Computer Science Feng Chia University Taichung40724 Taiwan Fujian Province University Fuzhou China Department of Computer Science and Information Engineering National Chin-Yi University of Technology Taichung41170 Taiwan
The security and privacy of digital images are a major concern in cyberspace. JPEG is the most widely used image compression standard and yet there are problems with format compatibility and file size preservation in ... 详细信息
来源: 评论
An effective compressed image authentication scheme based on N-variant AMBTC
收藏 引用
Multimedia Tools and Applications 2024年 第2期83卷 3801-3829页
作者: Su, Guo-Dong Chang, Chin-Chen Lin, Chia-Chen School of Big Data and Artificial Intelligence Fujian Polytechnic Normal University Fuzhou350300 China Department of Information Engineering and Computer Science Feng Chia University 100 Wenhwa Road Seatwen Taichung40724 Taiwan Department of Computer Science and Information Engineering National Chin-Yi University of Technology Taichung41170 Taiwan
Image authentication is one technique that provides integrity protection for digital images, making them sensitive to any slight modification. Recently, the detectability of absolute moment block truncation coding (AM... 详细信息
来源: 评论
A DL Intrusion Detection Method for Low-Rate Denial of Service Attacks
A DL Intrusion Detection Method for Low-Rate Denial of Servi...
收藏 引用
2023 Asia-Pacific Conference on Image Processing, Electronics and computers, IPEC 2023
作者: Wu, Yuhong Lv, Yunshan Hu, Xiangdong School of Big Data & Computer Science Engineering Chongqing College of Mobile Communication China School of Computer Science and Technology Chongqing University of Posts and Telecommunications Key Laboratory of Public Big Data Security Technology Chongqing Chongqing China School of Big Data & Computer Science Engineering Chongqing College of Mobile Communication Key Laboratory of Public Big Data Security Technology Chongqing China School of Automation Chongqing University of Posts and Telecommunications Chongqing China
Denial of service (DoS) attacks is among the most harmful network threats. Low-rate DoS (LDoS) attacks feature good concealment and are likely to evade detection by conventional signal analysis-based methods. A LDoS a... 详细信息
来源: 评论
Research on a Technology of Mail Anti-virus Gateway for Industrial Internet
Research on a Technology of Mail Anti-virus Gateway for Indu...
收藏 引用
2023 IEEE International Conference on Image Processing and computer Applications, ICIPCA 2023
作者: Wu, Yuhong Lv, Yunshan Zhang, Ling School of Big Data & Computer Science Engineering Chongqing College of Mobile Communication Key Laboratory of Public Big Data Security Technology Chongqing China School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing China
With the rapid rise of the Industrial Internet, emails that convey a large amount of information require a strong network security environment. Aiming at the increasingly complex mail virus prevention and control work... 详细信息
来源: 评论
Two-Stage Incentive Mechanism Based on a Cooperative Mode: A Stackelberg Game Approach
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 24722-24737页
作者: Wang, Long Wang, Yingjie Teng, Haojun Jiao, Xiuzhen Sun, Meimei Yang, Jishen Cai, Zhipeng Yantai University School of Computer and Control Engineering Yantai264005 China China Judicial Big Data Research Institute Co. Ltd China Naval Aviation University China Georgia State University Department of Computer Science AtlantaGA30303 United States
With the explosive growth of mobile data, Mobile Crowd Sensing (MCS) has become a popular paradigm for large-scale data collection. The difficulty of data collection and the gaps in workers’ sensing capabilities are ... 详细信息
来源: 评论
A Symbolic Rule Integration Framework with Logic Transformer for Inductive Relation Prediction  24
A Symbolic Rule Integration Framework with Logic Transformer...
收藏 引用
33rd ACM Web Conference, WWW 2024
作者: Pan, Yudai Liu, Jun Zhao, Tianzhe Zhang, Lingling Lin, Yun Dong, Jin Song School of Computer Science and Technology Xi'an Jiaotong University Shaanxi Xi'an China National Engineering Lab for Big Data Analytics Xi'an Jiaotong University Shaanxi Xi'an China Shaanxi Provincial Key Laboratory of Big Data Knowledge Engineering Xi'an Jiaotong University Shaanxi Xi'an China Shanghai Jiao Tong University Shanghai China National University of Singapore Singapore Singapore
Relation prediction in knowledge graphs (KGs) aims at predicting missing relations in incomplete triples, whereas the dominant paradigm by KG embeddings has a limitation to predict the relation between unseen entities... 详细信息
来源: 评论
Reversible data hiding scheme using prediction neural network and adaptive modulation mapping
收藏 引用
Multimedia Tools and Applications 2025年 第9期84卷 6665-6686页
作者: Chen, Si-Sheng Chang, Chin-Chen Horng, Ji-Hwei School of Big Data and Artificial Intelligence Fujian Polytechnic Normal University Fujian Fuzhou35030 China Department of Information Engineering and Computer Science Feng Chia University Taichung40724 Taiwan Department of Electrical Engineering National Quemoy University Kinmen89250 Taiwan
Prediction error expansion (PEE) is an attractive approach for reversible data hiding (RDH). The key issue for PEE-based RDH is to improve the prediction accuracy and design a better modulation mapping. This paper pro... 详细信息
来源: 评论
AI-Enhanced Secure data Aggregation for Smart Grids with Privacy Preservation
收藏 引用
computers, Materials & Continua 2025年 第1期82卷 799-816页
作者: Congcong Wang Chen Wang Wenying Zheng Wei Gu School of Software Nanjing University of Information Science and TechnologyNanjing210044China School of Information Science and Engineering Zhejiang Sci-Tech UniversityHangzhou310018China State Key Laboratory of Public Big Data Guizhou UniversityGuiyang550025China School of Computer Science and Technology(School of Artificial Intelligence) Zhejiang Sci-Tech UniversityHangzhou310018China School of Computer Science(School of Cyber Science and Engineering) Nanjing University of Information Science and TechnologyNanjing210044China
As smart grid technology rapidly advances,the vast amount of user data collected by smart meter presents significant challenges in data security and privacy *** research emphasizes data security and user privacy conce... 详细信息
来源: 评论