咨询与建议

限定检索结果

文献类型

  • 644 篇 期刊文献
  • 573 篇 会议
  • 3 册 图书

馆藏范围

  • 1,220 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 818 篇 工学
    • 629 篇 计算机科学与技术...
    • 533 篇 软件工程
    • 197 篇 信息与通信工程
    • 130 篇 生物工程
    • 112 篇 控制科学与工程
    • 98 篇 电气工程
    • 93 篇 生物医学工程(可授...
    • 73 篇 光学工程
    • 67 篇 电子科学与技术(可...
    • 46 篇 化学工程与技术
    • 35 篇 机械工程
    • 29 篇 动力工程及工程热...
    • 25 篇 建筑学
    • 24 篇 仪器科学与技术
    • 24 篇 安全科学与工程
    • 24 篇 网络空间安全
  • 449 篇 理学
    • 232 篇 数学
    • 149 篇 生物学
    • 100 篇 统计学(可授理学、...
    • 73 篇 物理学
    • 57 篇 化学
    • 43 篇 系统科学
  • 247 篇 管理学
    • 149 篇 管理科学与工程(可...
    • 100 篇 图书情报与档案管...
    • 59 篇 工商管理
  • 87 篇 医学
    • 71 篇 临床医学
    • 64 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
    • 31 篇 公共卫生与预防医...
  • 33 篇 法学
    • 24 篇 社会学
  • 20 篇 农学
  • 14 篇 经济学
  • 6 篇 教育学
  • 5 篇 军事学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 47 篇 feature extracti...
  • 41 篇 deep learning
  • 39 篇 training
  • 36 篇 semantics
  • 28 篇 computational mo...
  • 28 篇 accuracy
  • 26 篇 data models
  • 23 篇 machine learning
  • 23 篇 cloud computing
  • 22 篇 big data
  • 21 篇 predictive model...
  • 19 篇 contrastive lear...
  • 19 篇 federated learni...
  • 18 篇 convolution
  • 17 篇 visualization
  • 17 篇 security
  • 16 篇 optimization
  • 16 篇 correlation
  • 15 篇 task analysis
  • 15 篇 artificial intel...

机构

  • 124 篇 college of compu...
  • 103 篇 national enginee...
  • 48 篇 school of big da...
  • 35 篇 school of big da...
  • 34 篇 college of compu...
  • 34 篇 college of big d...
  • 30 篇 key laboratory o...
  • 29 篇 college of compu...
  • 29 篇 shenzhen researc...
  • 24 篇 college of compu...
  • 23 篇 school of comput...
  • 22 篇 big data institu...
  • 22 篇 guangdong provin...
  • 19 篇 shenzhen institu...
  • 17 篇 shenzhen univers...
  • 16 篇 peng cheng labor...
  • 16 篇 college of compu...
  • 14 篇 school of comput...
  • 14 篇 state key labora...
  • 14 篇 shenzhen univers...

作者

  • 37 篇 shen linlin
  • 18 篇 li jianqiang
  • 15 篇 shi qingjiang
  • 15 篇 huang joshua zhe...
  • 13 篇 gao can
  • 13 篇 linlin shen
  • 12 篇 xiuhua li
  • 12 篇 victor c. m. leu...
  • 12 篇 wang jinbao
  • 12 篇 jianqiang li
  • 11 篇 li xiuhua
  • 11 篇 jie chen
  • 10 篇 pan jeng-shyang
  • 10 篇 xiaofei wang
  • 10 篇 abduljabbar zaid...
  • 9 篇 zhou jie
  • 9 篇 zhong ming
  • 9 篇 tian chunwei
  • 9 篇 yu jiguo
  • 9 篇 jian-tao zhou

语言

  • 1,061 篇 英文
  • 149 篇 其他
  • 14 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Big Data Institute College of Computer Science and Software Engineering"
1220 条 记 录,以下是281-290 订阅
排序:
LLGS: Illuminating Gaussian Splatting via absorptance Modulation
LLGS: Illuminating Gaussian Splatting via absorptance Modula...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Jianwen Gan Wenxin Li Bo Zheng Chengliang Wang Yingbo Wu National Elite Institute of Engineering Chongqing University China AI Lab Chongqing Changan Automobile Co. Ltd. China College of Computer Science Chongqing University China School of Big Data & Software Engineering Chongqing University China
Low-light images are typically characterized by low pixel intensity and color distortion, presenting a significant challenge for accurate 3D reconstruction with 3D Gaussian Splatting (3DGS). Traditional 2D enhancement... 详细信息
来源: 评论
Learning with Open-world Noisy data via Class-independent Margin in Dual Representation Space  39
Learning with Open-world Noisy Data via Class-independent Ma...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Pan, Linchao Gao, Can Zhou, Jie Wang, Jinbao College of Computer Science and Software Engineering Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China
Learning with Noisy Labels (LNL) aims to improve the model generalization when facing data with noisy labels, and existing methods generally assume that noisy labels come from known classes, called closed-set noise. H... 详细信息
来源: 评论
A Surrogate-Assisted Evolutionary Algorithm for Expensive Dynamic Multimodal Optimzation
A Surrogate-Assisted Evolutionary Algorithm for Expensive Dy...
收藏 引用
Congress on Evolutionary Computation
作者: Xunfeng Wu Songbai Liu Junkai Ji Lijia Ma Victor C. M. Leung College of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Department of Electrical and Computer Engineering The University of British Columbia Vancouver Canada
Surrogate-assisted evolutionary algorithms (SAEAs) have demonstrated promising optimization performance in addressing expensive dynamic optimization problems or expensive multimodal optimization problems. However, non... 详细信息
来源: 评论
APSeg: Auto-Prompt Network for Cross-Domain Few-Shot Semantic Segmentation
arXiv
收藏 引用
arXiv 2024年
作者: He, Weizhao Zhang, Yang Zhuo, Wei Shen, Linlin Yang, Jiaqi Deng, Songhe Sun, Liang Computer Vision Institute School of Computer Science & Software Engineering Shenzhen University China Shenzhen Institute of Artificial Intelligence and Robotics for Society China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China School of Computer Science University of Nottingham China
Few-shot semantic segmentation (FSS) endeavors to segment unseen classes with only a few labeled samples. Current FSS methods are commonly built on the assumption that their training and application scenarios share si... 详细信息
来源: 评论
Multi-Scale Dynamic and Hierarchical Relationship Modeling for Facial Action Units Recognition
Multi-Scale Dynamic and Hierarchical Relationship Modeling f...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Zihan Wang Siyang Song Cheng Luo Songhe Deng Weicheng Xie Linlin Shen Computer Vision Institute School of Computer Science & Software Engineering Shenzhen University Shenzhen Institute of Artificial Intelligence and Robotics for Society National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Universiry of Leicester Monash University
Human facial action units (AUs) are mutually related in a hierarchical manner, as not only they are associated with each other in both spatial and temporal domains but also AUs located in the same/close facial regions... 详细信息
来源: 评论
Enhancing Consistency in Container Migration via TEE: A Secure Architecture
Enhancing Consistency in Container Migration via TEE: A Secu...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Qingyu Gao Liantao Song Yan Lei Feng Wang Lei Wang Shize Zong Yan Ding College of Computer Science National University of Defense Technology Changsha China School of Big Data and Software Engineering Chongqing University Chongqing China College of Computer Science and Electronic Engineering Hunan University Changsha China National Innovation Institution of Defense Technology AMS China
Secure migration of multi-tenant containerized cloud servers is critical to maintaining the stability and security of cloud services. However, migrating applications across servers owned by different platforms introdu... 详细信息
来源: 评论
Graph-Augmented Contrastive Clustering for Time Series
SSRN
收藏 引用
SSRN 2023年
作者: Zhang, Qin Liang, Zhuoluo Ngueilbaye, Alladoumbaye Zhang, Peng Chen, Junyang Chen, Xiaojun Huang, Joshua Zhexue Big Data Institute College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou510006 China
The recent emergence of time series contrastive clustering methods can be broadly categorized into two classes. The first class uses contrastive learning to learn universal representations for time series. Though they... 详细信息
来源: 评论
Depth-Aware Multi-Modal Fusion for Generalized Zero-Shot Learning  22
Depth-Aware Multi-Modal Fusion for Generalized Zero-Shot Lea...
收藏 引用
22nd IEEE International Conference on Industrial Informatics, INDIN 2024
作者: Cao, Weipeng Yao, Xuyang Xu, Zhiwu Pan, Yinghui Sun, Yixuan Li, Dachuan Qiu, Bohua Wei, Muheng Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China College of Computer Science and Software Engineering Shenzhen University Shenzhen China Stony Brook University New York United States Research Institute of Trustworthy Autonomous Systems Southern University of Science and Technology Shenzhen China Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen China ZhenDui Industry Artificial Intelligence Co. Ltd Shenzhen China Department of Automation Shanghai Jiao Tong University Shanghai China Key Laboratory of System Control and Information Processing Ministry of Education of China Shanghai China
Realizing Generalized Zero-Shot Learning (GZSL) based on large models is emerging as a prevailing trend. However, most existing methods merely regard large models as black boxes, solely leveraging the features output ... 详细信息
来源: 评论
Enhancing Consistency in Container Migration via TEE: A Secure Architecture  23
Enhancing Consistency in Container Migration via TEE: A Secu...
收藏 引用
23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024
作者: Gao, Qingyu Song, Liantao Lei, Yan Wang, Feng Wang, Lei Zong, Shize Ding, Yan National University of Defense Technology College of Computer Science Changsha China Chongqing University School of Big Data and Software Engineering Chongqing China Hunan University College of Computer Science and Electronic Engineering Changsha China Ams National Innovation Institution of Defense Technology China
Secure migration of multi-tenant containerized cloud servers is critical to maintaining the stability and security of cloud services. However, migrating applications across servers owned by different platforms introdu... 详细信息
来源: 评论
Fingerprint Presentation Attack Detector Using Global-Local Model
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Haozhe Zhang, Wentian Liu, Feng Wu, Haoqian Shen, Linlin The Computer Vision Institute College of Computer Science and Software Engineering SZU Branch Shenzhen Institute of Artificial Intelligence and Robotics for Society The National Engineering Laboratory for Big Data System Computing Technology The Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen518060 China
The vulnerability of automated fingerprint recognition systems (AFRSs) to presentation attacks (PAs) promotes the vigorous development of PA detection (PAD) technology. However, PAD methods have been limited by inform... 详细信息
来源: 评论