咨询与建议

限定检索结果

文献类型

  • 626 篇 期刊文献
  • 549 篇 会议
  • 3 册 图书

馆藏范围

  • 1,178 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 777 篇 工学
    • 593 篇 计算机科学与技术...
    • 520 篇 软件工程
    • 189 篇 信息与通信工程
    • 129 篇 生物工程
    • 92 篇 生物医学工程(可授...
    • 91 篇 电气工程
    • 90 篇 控制科学与工程
    • 72 篇 光学工程
    • 64 篇 电子科学与技术(可...
    • 46 篇 化学工程与技术
    • 35 篇 机械工程
    • 29 篇 动力工程及工程热...
    • 24 篇 仪器科学与技术
    • 24 篇 建筑学
    • 22 篇 材料科学与工程(可...
    • 22 篇 安全科学与工程
  • 446 篇 理学
    • 229 篇 数学
    • 149 篇 生物学
    • 98 篇 统计学(可授理学、...
    • 73 篇 物理学
    • 57 篇 化学
    • 43 篇 系统科学
  • 238 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 98 篇 图书情报与档案管...
    • 55 篇 工商管理
  • 87 篇 医学
    • 71 篇 临床医学
    • 64 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
    • 31 篇 公共卫生与预防医...
  • 32 篇 法学
    • 24 篇 社会学
  • 20 篇 农学
  • 14 篇 经济学
  • 6 篇 教育学
  • 5 篇 军事学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 42 篇 feature extracti...
  • 38 篇 deep learning
  • 38 篇 training
  • 36 篇 semantics
  • 27 篇 computational mo...
  • 26 篇 accuracy
  • 25 篇 data models
  • 23 篇 machine learning
  • 23 篇 cloud computing
  • 22 篇 big data
  • 21 篇 predictive model...
  • 17 篇 convolution
  • 17 篇 security
  • 17 篇 federated learni...
  • 16 篇 visualization
  • 15 篇 task analysis
  • 15 篇 contrastive lear...
  • 15 篇 correlation
  • 15 篇 artificial intel...
  • 15 篇 adaptation model...

机构

  • 114 篇 college of compu...
  • 93 篇 national enginee...
  • 46 篇 school of big da...
  • 36 篇 school of big da...
  • 33 篇 college of compu...
  • 31 篇 college of big d...
  • 29 篇 college of compu...
  • 28 篇 key laboratory o...
  • 27 篇 shenzhen researc...
  • 23 篇 school of comput...
  • 22 篇 big data institu...
  • 22 篇 college of compu...
  • 19 篇 shenzhen institu...
  • 17 篇 shenzhen univers...
  • 16 篇 peng cheng labor...
  • 16 篇 college of compu...
  • 15 篇 guangdong provin...
  • 14 篇 school of comput...
  • 14 篇 state key labora...
  • 14 篇 college of compu...

作者

  • 34 篇 shen linlin
  • 16 篇 li jianqiang
  • 15 篇 huang joshua zhe...
  • 14 篇 shi qingjiang
  • 13 篇 linlin shen
  • 12 篇 xiuhua li
  • 12 篇 victor c. m. leu...
  • 12 篇 jianqiang li
  • 11 篇 li xiuhua
  • 11 篇 jie chen
  • 10 篇 gao can
  • 10 篇 pan jeng-shyang
  • 10 篇 leung victor c.m...
  • 10 篇 xiaofei wang
  • 10 篇 abduljabbar zaid...
  • 9 篇 zhong ming
  • 9 篇 tian chunwei
  • 9 篇 jian-tao zhou
  • 9 篇 lyu shen-huan
  • 8 篇 qilin fan

语言

  • 1,080 篇 英文
  • 89 篇 其他
  • 12 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Big Data Institute College of Computer Science and Software Engineering"
1178 条 记 录,以下是211-220 订阅
排序:
A Comparative Study for Temperature Prediction by Machine Learning and Deep Learning
A Comparative Study for Temperature Prediction by Machine Le...
收藏 引用
Intelligent Computing and Control (IC&C), International Conference on
作者: Heng Zhao Yixing Chen College of Big Data and Internet Shenzhen Technology University Shenzhen China College of Computer Science and Software Engineering Shenzhen University Shenzhen China
Time series prediction has been a hot research topic for decades. Temperature data is typical time series data, so temperature prediction is an important applications. In recent years, Machine Learning has been applie...
来源: 评论
Brain-inspired artificial intelligence research: A review
收藏 引用
science China(Technological sciences) 2024年 第8期67卷 2282-2296页
作者: WANG GuoYin BAO HuaNan LIU Qun ZHOU TianGang WU Si HUANG TieJun YU ZhaoFei LU CeWu GONG YiHong ZHANG ZhaoXiang HE Sheng Chongqing Key Laboratory of Computational Intelligence Chongqing University of Posts and TelecommunicationsChongqing 400065China Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and TelecommunicationsChongqing 400065China College of Computer and Information Science Chongqing Normal UniversityChongqing 401331China State Key Laboratory of Brain and Cognitive Science Institute of BiophysicsChinese Academy of SciencesBeijing 100101China School of Psychological and Cognitive Sciences Peking UniversityBeijing 100871China State Key Laboratory of Multimedia Information Processing School of Computer SciencePeking UniversityBeijing 100871China Department of Computer Science School of ElectronicsInformation and Electrical EngineeringShanghai Jiao Tong UniversityShanghai 200240China Faculty of Electronic and Information Engineering Xi’an Jiaotong UniversityXi’an 710049China The Center for Research on Intelligent Perception and Computing Institute of AutomationChinese Academy of SciencesBeijing 100190China Institute of Biophysics Chinese Academy of SciencesBeijing 100101China
Artificial intelligence(AI) systems surpass certain human intelligence abilities in a statistical sense as a whole, but are not yet the true realization of these human intelligence abilities and behaviors. There are d... 详细信息
来源: 评论
Advancements in Cybersecurity Using Deep Learning Techniques Attack Detection for Trojan Horses
Advancements in Cybersecurity Using Deep Learning Techniques...
收藏 引用
2024 International Conference on Electrical, Electronics and Computing Technologies, ICEECT 2024
作者: Hosanna Princye, P. Ahila, A. Lakshmi, A. Anna Ragavendran, N. Purushothaman, K.E. Uma Maheswari, G. Saravanakumar, R. Sri Sairam College of Engineering Department of Electronics and Communication Engineering Anekal Bangalore India R.M.K. Engineering College Department of Information Technology Tamil Nadu Chennai India RMK College of Engineering and Technology Department of Artificial Intelligence and Data Science Engineering Tamil Nadu Chennai India Vel Tech Rangarajan Dr. Sagunthala R and D Institute of Science and Technology Department of Electronics and Communication Engineering Tamil Nadu Chennai India RMK College of Engineering and Technology Department of Computer Science and Engineering Tamil Nadu Chennai India Software Analyst Iconix Software Solution Tamil Nadu Tirunelveli India
Today's computer networks are threatened by Trojan horse assaults and other cybersecurity dangers. We propose and evaluate deep learning methods using the Kaggle-hosted Trojan Detection dataset to detect Trojan ho... 详细信息
来源: 评论
2D Animation - Q Version of the AIDS Prevention Short Video  10
2D Animation - Q Version of the AIDS Prevention Short Video
收藏 引用
10th International Conference on Orange Technology, ICOT 2022
作者: Wei, Chun-Cheng Hsieh, Hui-Ming Hung, Long-Chen Chen, Ru-Yi Huang, Jiang-Fang Lu, Xin-Chun Zhong, Yu-Shan School of Software and Big Data Changzhou College of Information Technology Changzhou China Taiwan Shoufu University Department of Computer Science and Multimedia Design Tainan Taiwan Lunghwa University of Science and Technology Department of Electronic Engineering Taiwan
AIDS is a sexually transmitted disease. The medical term is called Acquired Immune Deficiency Syndrome. Medical methods such as cocktail therapy and anticancer drugs can kill AIDS. Although there are currently cured c... 详细信息
来源: 评论
A Secured and Optimized Broadcast Authentication Scheme for the Internet of Medical Things  4
A Secured and Optimized Broadcast Authentication Scheme for ...
收藏 引用
4th IEEE International Conference on Electrical, computer, and Energy Technologies, ICECET 2024
作者: Riaz, Syed Waleed Khan, Fazlullah Ullah, Insaf Alshawi, Bandar Alturki, Ryan Wedyan, Mohammad Abdul Wali Khan University Mardan Computer Science Department KPK Pakistan School of Computer Science University of Nottingham Ningbo China Faculty of Science and Engineering Zhejiang Ningbo315104 China Institute for Analytics and Data Science University of Essex ColchesterCO4 3SQ United Kingdom College of Computing Umm Al-Qura University Department of Computer and Network Engineering Makkah Saudi Arabia College of Computing Umm Al-Qura University Department of Software Engineering Makkah Saudi Arabia Faculty of Information Technology and Computer Sciences Department of Computer Sciences Irbid21163 Jordan
This Internet of Medical Things (IoMT), facilitates the medical stop regarding real-time monitoring of patients, medical emergency management, remote surgery, patient information management, medical equipment, drug mo... 详细信息
来源: 评论
Birth Mode Prediction Using Bagging Ensemble Classifier: A Case Study of Bangladesh
Birth Mode Prediction Using Bagging Ensemble Classifier: A C...
收藏 引用
2021 International Conference on Information and Communication Technology for Sustainable Development, ICICT4SD 2021
作者: Bin Alam, Md. Sakib Patwary, Muhammed J. A. Hassan, Maruf Asian University for Women Department of Computer Science Bangladesh Big Data Institute College of Computer Science and Software Engineering Shenzhen University China International Islamic University Chittagong Department of Computer Science and Engineering Bangladesh
Maternal mortality and childbirth complications are major delivery issues in most developing countries, especially in rural areas. The proper identification of risks associated with the delivery of an expecting woman ... 详细信息
来源: 评论
Multi-view aggregation and multi-relation alignment for few-shot fine-grained recognition
收藏 引用
Expert Systems with Applications 2025年 283卷
作者: Chen, Jiale Xu, Feng Lyu, Xin Zeng, Tao Li, Xin Chen, Shangjing College of Computer Science and Software Engineering Hohai University Nanjing210024 China School of Computer Engineering Jiangsu Ocean University Lianyungang222005 China Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing211106 China
Few-shot fine-grained recognition (FS-FGR) aims to recognize nuanced categories with a limited number of labeled samples that were not encountered during training. Previous work has made significant progress by enhanc... 详细信息
来源: 评论
Towards High-resolution 3D Anomaly Detection via Group-Level Feature Contrastive Learning  24
Towards High-resolution 3D Anomaly Detection via Group-Level...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Zhu, Hongze Xie, Guoyang Hou, Chengbin Dai, Tao Gao, Can Wang, Jinbao Shen, Linlin National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Department of Computer Science City University of Hong Kong Hong Kong Hong Kong Department of Intelligent Manufacturing CATL Ningde China Fuzhou Fuyao Institute for Advanced Study Fuyao University of Science and Technology Fuzhou China College of Computer Science and Software Engineering Shenzhen University Shenzhen China Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen China Shenzhen University Shenzhen China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen China
High-resolution point clouds (HRPCD) anomaly detection (AD) plays a critical role in precision machining and high-end equipment manufacturing. Despite considerable 3D-AD methods that have been proposed recently, they ... 详细信息
来源: 评论
An Efficient Blockchain-Based Certificateless Anonymous Authentication Scheme for VANETs
An Efficient Blockchain-Based Certificateless Anonymous Auth...
收藏 引用
2023 International Conference on Networking and Network Applications, NaNA 2023
作者: Bi, Changbing Tian, Youliang Li, Ta Wu, Shihong Zhou, Hua Guizhou University State Key Laboratory of Public Big Data Guiyang550025 China College of Computer Science and Technology Guizhou University Guiyang550025 China Guizhou University Guizhou Province Key Laboratory of Cryptography and Block Chain Technology Guiyang550025 China Institute of Cryptography & Data Security Guizhou University Guiyang550025 China College of Big Data and Information Engineering Guizhou University Guiyang550025 China
Vehicle ad-hoc networks (VANETs) play a critical role in providing security and privacy protection for intelligent transportation systems. However, the limited network bandwidth and computing capacity within VANETs ha... 详细信息
来源: 评论
eSROP Attack: Leveraging Signal Handler to Implement Turing-Complete Attack Under CFI Defense  1
收藏 引用
18th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2022
作者: Zhang, Tianning Cai, Miao Zhang, Diming Huang, Hao Department of Computer Science and Technology Nanjing University Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing China School of Computer and Information Hohai University Nanjing China College of Computer Engineering Jiangsu University of Science and Technology Nanjing China
Signal Return Oriented Programming (SROP) is a dangerous code reuse attack method. Recently, defense techniques have been proposed to defeat SROP attacks. In this paper, we leverage the signal nesting mechanism provid... 详细信息
来源: 评论