咨询与建议

限定检索结果

文献类型

  • 644 篇 期刊文献
  • 573 篇 会议
  • 3 册 图书

馆藏范围

  • 1,220 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 818 篇 工学
    • 629 篇 计算机科学与技术...
    • 533 篇 软件工程
    • 197 篇 信息与通信工程
    • 130 篇 生物工程
    • 112 篇 控制科学与工程
    • 98 篇 电气工程
    • 93 篇 生物医学工程(可授...
    • 73 篇 光学工程
    • 67 篇 电子科学与技术(可...
    • 46 篇 化学工程与技术
    • 35 篇 机械工程
    • 29 篇 动力工程及工程热...
    • 25 篇 建筑学
    • 24 篇 仪器科学与技术
    • 24 篇 安全科学与工程
    • 24 篇 网络空间安全
  • 449 篇 理学
    • 232 篇 数学
    • 149 篇 生物学
    • 100 篇 统计学(可授理学、...
    • 73 篇 物理学
    • 57 篇 化学
    • 43 篇 系统科学
  • 247 篇 管理学
    • 149 篇 管理科学与工程(可...
    • 100 篇 图书情报与档案管...
    • 59 篇 工商管理
  • 87 篇 医学
    • 71 篇 临床医学
    • 64 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
    • 31 篇 公共卫生与预防医...
  • 33 篇 法学
    • 24 篇 社会学
  • 20 篇 农学
  • 14 篇 经济学
  • 6 篇 教育学
  • 5 篇 军事学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 47 篇 feature extracti...
  • 41 篇 deep learning
  • 39 篇 training
  • 36 篇 semantics
  • 28 篇 computational mo...
  • 28 篇 accuracy
  • 26 篇 data models
  • 23 篇 machine learning
  • 23 篇 cloud computing
  • 22 篇 big data
  • 21 篇 predictive model...
  • 19 篇 contrastive lear...
  • 19 篇 federated learni...
  • 18 篇 convolution
  • 17 篇 visualization
  • 17 篇 security
  • 16 篇 optimization
  • 16 篇 correlation
  • 15 篇 task analysis
  • 15 篇 artificial intel...

机构

  • 124 篇 college of compu...
  • 103 篇 national enginee...
  • 48 篇 school of big da...
  • 35 篇 school of big da...
  • 34 篇 college of compu...
  • 34 篇 college of big d...
  • 30 篇 key laboratory o...
  • 29 篇 college of compu...
  • 29 篇 shenzhen researc...
  • 24 篇 college of compu...
  • 23 篇 school of comput...
  • 22 篇 big data institu...
  • 22 篇 guangdong provin...
  • 19 篇 shenzhen institu...
  • 17 篇 shenzhen univers...
  • 16 篇 peng cheng labor...
  • 16 篇 college of compu...
  • 14 篇 school of comput...
  • 14 篇 state key labora...
  • 14 篇 shenzhen univers...

作者

  • 37 篇 shen linlin
  • 18 篇 li jianqiang
  • 15 篇 shi qingjiang
  • 15 篇 huang joshua zhe...
  • 13 篇 gao can
  • 13 篇 linlin shen
  • 12 篇 xiuhua li
  • 12 篇 victor c. m. leu...
  • 12 篇 wang jinbao
  • 12 篇 jianqiang li
  • 11 篇 li xiuhua
  • 11 篇 jie chen
  • 10 篇 pan jeng-shyang
  • 10 篇 xiaofei wang
  • 10 篇 abduljabbar zaid...
  • 9 篇 zhou jie
  • 9 篇 zhong ming
  • 9 篇 tian chunwei
  • 9 篇 yu jiguo
  • 9 篇 jian-tao zhou

语言

  • 1,061 篇 英文
  • 149 篇 其他
  • 14 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Big Data Institute College of Computer Science and Software Engineering"
1220 条 记 录,以下是521-530 订阅
排序:
Risk Identification Method for Smuggled Frozen Meat in Urban Public Safety Awareness and Early Warning
Risk Identification Method for Smuggled Frozen Meat in Urban...
收藏 引用
2023 International Conference on Intelligent Communication and Networking, ICN 2023
作者: Li, Xueru Zhang, Yan Liu, Lingjie Tian, Ye Zhang, Yue Harbin Engineering University College of Computer Science and Technology Harbin China China Industrial Control Systems Cyber Emergency Response Team Beijing China Environment and Food and Drug Crime Investigation Detachment of Hangzhou Public Security Bureau Hangzhou China Xidian University Hangzhou Institute of Technology Hangzhou China Key Laboratory of Peace-Building Big Data of Zhejiang Province Zhejiang China
With the continuous growth in demand for meat and frozen products in the cold chain market, illegally smuggled frozen goods have quickly entered the market due to their low prices, leading to a series of food safety i... 详细信息
来源: 评论
Simplify Implant Depth Prediction as Video Grounding: A Texture Perceive Implant Depth Prediction Network
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Xinquan Li, Xuguang Luo, Xiaoling Zeng, Leilei Zhang, Yudi Shen, Linlin Deng, Yongqiang College of Computer Science and Software Engineering Shenzhen University Shenzhen China AI Research Center for Medical Image Analysis and Diagnosis Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Department of Stomatology Shenzhen University General Hospital Shenzhen China
Surgical guide plate is an important tool for the dental implant surgery. However, the design process heavily relies on the dentist to manually simulate the implant angle and depth. When deep neural networks have been... 详细信息
来源: 评论
Neural network based on improved parallel bat algorithm and its application
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2021年 第3期6卷 428-439页
作者: Zhao, Zhuo-Qiang Liu, Shi-Jian Xu, Lin Pan, Jeng-Shyang Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology Fuzhou350118 China Institute of Artificial Intelligence Fujian University of Technology Fuzhou350118 China STEM University of South Australia Australia College of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China
The artificial neural network is a research hotspot emerging in the field of artificial intelligence. Back Propagation (BP) neural network plays an important role in neural network. The network has the disadvantages o... 详细信息
来源: 评论
A Lightweight and Robust Access Control Protocol for IoT-based e-Healthcare Network
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Ghaffar, Zahid Kuo, Wen-Chung Mahmood, Khalid Tariq, Tayyaba Shamshad, Salman Das, Ashok Kumar Alenazi, Mohammed J.F. National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Douliu64002 Taiwan National Yunlin University of Science and Technology Department of Computer Science and Information Engineering Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University Department of Computer Science and Engineering College of Informatics 145 Anam-ro Seongbuk-gu Seoul02841 Korea Republic of King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh Saudi Arabia
Internet of Things (IoT) devices are crucial components in e-healthcare networks. It enables remote patient health monitoring and facilitates seamless communication among medical sensors, wearable devices, and healthc... 详细信息
来源: 评论
Blockchain-Based Multi-Cloud data Storage System Disaster Recovery
Blockchain-Based Multi-Cloud Data Storage System Disaster Re...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Feiyu Wang Jian-tao Zhou College of Computer Science Inner Mongolia University Hohhot Inner Mongolia China Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Inner Mongolia Key Laboratory of Social Computing and Data Processing Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Engineering Research Center of Ecological Big Data Ministry of Education National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian China
Cloud storage services have been used by most businesses and individual users. However, data loss, service interruptions and cyber attacks often lead to cloud storage services not being provided properly, and these in...
来源: 评论
GM-DF: Generalized Multi-Scenario Deepfake Detection
arXiv
收藏 引用
arXiv 2024年
作者: Lai, Yingxin Yu, Zitong Yang, Jing Li, Bin Kang, Xiangui Shen, Linlin The School of Computing and Information Technology Great Bay University Dongguan523000 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen University Shenzhen518060 China The Guangdong Key Laboratory of Information Security The School of Computer Science and Engineering Sun Yat-sen University Guangzhou510080 China Computer Vision Institute School of Computer Science & Software Engineering Shenzhen Institute of Artificial Intelligence and Robotics for Society Guangdong Key Laboratory of Intelligent Information Processing National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China
Existing face forgery detection usually follows the paradigm of training models in a single domain, which leads to limited generalization capacity when unseen scenarios and unknown attacks occur. In this paper, we ela... 详细信息
来源: 评论
SPA: a graph spectral alignment perspective for domain adaptation  23
SPA: a graph spectral alignment perspective for domain adapt...
收藏 引用
Proceedings of the 37th International Conference on Neural Information Processing Systems
作者: Zhiqing Xiao Haobo Wang Ying Jin Lei Feng Gang Chen Fei Huang Junbo Zhao College of Computer Science and Technology Zhejiang University and Key Lab of Intelligent Computing based Big Data of Zhejiang Province Zhejiang University School of Software Technology Zhejiang University and Key Lab of Intelligent Computing based Big Data of Zhejiang Province Zhejiang University CUHK-SenseTime Joint Lab The Chinese University of Hong Kong School of Computer Science and Engineering Nanyang Technological University Alibaba Group
Unsupervised domain adaptation (UDA) is a pivotal form in machine learning to extend the in-domain model to the distinctive target domains where the data distributions differ. Most prior works focus on capturing the i...
来源: 评论
Random Forest and Sobol Method Based data Center PUE Prediction
Random Forest and Sobol Method Based Data Center PUE Predict...
收藏 引用
International Conference on Information, Communication and Networks (ICICN)
作者: Longchuan Yan Zhaofang Luan Ling He Congfeng Jiang Junming Liu Chuanqi Xu Liangbin Zhang Information & Telecommunication Branch State Grid Corporation of China Beijing China School of Computer Science and Technology Hangzhou Dianzi University Hangzhou China Information Technology Center Hangzhou Dianzi University Hangzhou China College of Big Data and Software Engineering Zhejiang Wanli University Ningbo China
data centers are critical infrastructures that support a multitude of business loads such as big data, artificial intelligence, and cloud computing. While providing the necessary computing power, the problem of high e... 详细信息
来源: 评论
BMDP:Blockchain-Based Multi-Cloud Storage data Provenance
BMDP:Blockchain-Based Multi-Cloud Storage Data Provenance
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Feiyu Wang Jian-Tao Zhou Xu Guo College of Computer Science Inner Mongolia University Hohhot Inner Mongolia China Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Engineering Research Center of Ecological Big Data Ministry of Education National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian Inner Mongolia Key Laboratory of Social Computing and Data Processing Inner Mongolia Engineering Laboratory for Big Data Analysis Technology China
In a multi-cloud storage system, provenance data records all operations and ownership during its lifecycle, which is critical for data security and audibility. However, recording provenance data also poses some challe...
来源: 评论
MINDFLOW: A NETWORK TRAFFIC ANOMALY DETECTION MODEL BASED ON MINDSPORE
arXiv
收藏 引用
arXiv 2025年
作者: Xiang, Qiuyan Wu, Shuang Wu, Dongze Liu, Yuxin Qin, Zhenkai School of Information Technology Guangxi Police College 530028 China College of Computer Science and AI Southwest Minzu University 610213 China Institute of Software Chinese Academy of Sciences 100190 China School of Computing and Information China Network Security Research Center China Big Data and Policing Technology Laboratory Guangxi Police College Guangxi Nanning China
With the wide application of IoT and industrial IoT technologies, the network structure is becoming more and more complex, and the traffic scale is growing rapidly, which makes the traditional security protection mech... 详细信息
来源: 评论