咨询与建议

限定检索结果

文献类型

  • 644 篇 期刊文献
  • 573 篇 会议
  • 3 册 图书

馆藏范围

  • 1,220 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 818 篇 工学
    • 629 篇 计算机科学与技术...
    • 533 篇 软件工程
    • 197 篇 信息与通信工程
    • 130 篇 生物工程
    • 112 篇 控制科学与工程
    • 98 篇 电气工程
    • 93 篇 生物医学工程(可授...
    • 73 篇 光学工程
    • 67 篇 电子科学与技术(可...
    • 46 篇 化学工程与技术
    • 35 篇 机械工程
    • 29 篇 动力工程及工程热...
    • 25 篇 建筑学
    • 24 篇 仪器科学与技术
    • 24 篇 安全科学与工程
    • 24 篇 网络空间安全
  • 449 篇 理学
    • 232 篇 数学
    • 149 篇 生物学
    • 100 篇 统计学(可授理学、...
    • 73 篇 物理学
    • 57 篇 化学
    • 43 篇 系统科学
  • 247 篇 管理学
    • 149 篇 管理科学与工程(可...
    • 100 篇 图书情报与档案管...
    • 59 篇 工商管理
  • 87 篇 医学
    • 71 篇 临床医学
    • 64 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
    • 31 篇 公共卫生与预防医...
  • 33 篇 法学
    • 24 篇 社会学
  • 20 篇 农学
  • 14 篇 经济学
  • 6 篇 教育学
  • 5 篇 军事学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 47 篇 feature extracti...
  • 41 篇 deep learning
  • 39 篇 training
  • 36 篇 semantics
  • 28 篇 computational mo...
  • 28 篇 accuracy
  • 26 篇 data models
  • 23 篇 machine learning
  • 23 篇 cloud computing
  • 22 篇 big data
  • 21 篇 predictive model...
  • 19 篇 contrastive lear...
  • 19 篇 federated learni...
  • 18 篇 convolution
  • 17 篇 visualization
  • 17 篇 security
  • 16 篇 optimization
  • 16 篇 correlation
  • 15 篇 task analysis
  • 15 篇 artificial intel...

机构

  • 124 篇 college of compu...
  • 103 篇 national enginee...
  • 48 篇 school of big da...
  • 35 篇 school of big da...
  • 34 篇 college of compu...
  • 34 篇 college of big d...
  • 30 篇 key laboratory o...
  • 29 篇 college of compu...
  • 29 篇 shenzhen researc...
  • 24 篇 college of compu...
  • 23 篇 school of comput...
  • 22 篇 big data institu...
  • 22 篇 guangdong provin...
  • 19 篇 shenzhen institu...
  • 17 篇 shenzhen univers...
  • 16 篇 peng cheng labor...
  • 16 篇 college of compu...
  • 14 篇 school of comput...
  • 14 篇 state key labora...
  • 14 篇 shenzhen univers...

作者

  • 37 篇 shen linlin
  • 18 篇 li jianqiang
  • 15 篇 shi qingjiang
  • 15 篇 huang joshua zhe...
  • 13 篇 gao can
  • 13 篇 linlin shen
  • 12 篇 xiuhua li
  • 12 篇 victor c. m. leu...
  • 12 篇 wang jinbao
  • 12 篇 jianqiang li
  • 11 篇 li xiuhua
  • 11 篇 jie chen
  • 10 篇 pan jeng-shyang
  • 10 篇 xiaofei wang
  • 10 篇 abduljabbar zaid...
  • 9 篇 zhou jie
  • 9 篇 zhong ming
  • 9 篇 tian chunwei
  • 9 篇 yu jiguo
  • 9 篇 jian-tao zhou

语言

  • 1,061 篇 英文
  • 149 篇 其他
  • 14 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Big Data Institute College of Computer Science and Software Engineering"
1220 条 记 录,以下是581-590 订阅
排序:
FaceBench: A Multi-View Multi-Level Facial Attribute VQA dataset for Benchmarking Face Perception MLLMs
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Xiaoqin Ma, Xusen Hou, Xianxu Ding, Meidan Li, Yudong Chen, Junliang Chen, Wenting Peng, Xiaoyang Shen, Linlin Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China AIAC Xi’an Jiaotong-Liverpool University China Tsinghua University China The Hong Kong Polytechnic University Hong Kong City University of Hong Kong Hong Kong Sun Yat-sen University China
Multimodal large language models (MLLMs) have demonstrated remarkable capabilities in various tasks. However, effectively evaluating these MLLMs on face perception remains largely unexplored. To address this gap, we i...
来源: 评论
Vulnerability Detection with Graph Simplification and Enhanced Graph Representation Learning
arXiv
收藏 引用
arXiv 2023年
作者: Wen, Xin-Cheng Chen, Yupan Gao, Cuiyun Zhang, Hongyu Zhang, Jie M. Liao, Qing School of Computer Science and Technology Harbin Institute of Technology Shenzhen China School of Big Data and Software Engineering Chongqing University China Department of Informatics King’s College London United Kingdom Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies China Peng Cheng Laboratory China
Prior studies have demonstrated the effectiveness of Deep Learning (DL) in automated software vulnerability detection. Graph Neural Networks (GNNs) have proven effective in learning the graph representations of source... 详细信息
来源: 评论
Advancing cancer driver gene detection via Schur complement graph augmentation and independent subspace feature extraction
收藏 引用
computers in Biology and Medicine 2024年 174卷 108484-108484页
作者: Ma, Xinqian Li, Zhen Du, Zhenya Xu, Yan Chen, Yifan Zhuo, Linlin Fu, Xiangzheng Liu, Ruijun School of Data Science and Artificial Intelligence Wenzhou University of Technology Wenzhou325027 China Guangzhou Xinhua University Guangzhou510520 China School of Computer Science of Information Technology Qiannan Normal University for Nationalities Guizhou Duyun558000 China Institute of Computational Science and Technology Guangzhou University Guangzhou510000 China College of Computer and Information Engineering Central South University of Forestry and Technology Hunan Changsha410004 China College of Computer Science and Electronic Engineering Hunan University Changsha410012 China School of Software Beihang University Beijing China
Accurately identifying cancer driver genes (CDGs) is crucial for guiding cancer treatment and has recently received great attention from researchers. However, the high complexity and heterogeneity of cancer gene regul... 详细信息
来源: 评论
Optimizing Cloud IoT Applications with Machine Learning Driven Hybrid Key Management Protocols for WSN Performance
Optimizing Cloud IoT Applications with Machine Learning Driv...
收藏 引用
International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES)
作者: Simhadri Mallikarjuna Rao B. Adinarayana Kasani Vaddikasulu Satya Prasad Dontamsetti Peesapati Surya Venkata Ranganadh Research Scholar Department of Computer Science and Engineering Aacharya Nagarjuna University Guntur Andhra Pradesh India R &D Department of EEE & CSE Ravi Technology Vishakhapatnam Andhra Pradesh India Department of Computer Science and Engineering Eluru college of engineering and technology Eluru Andhra Pradesh India Department of Artificial Intelligence and Data Science Vishnu Institute of Technology Bhimavaram Andhra Pradesh India Software Engineer USA
AI-IoT integration is significant, changing the future of networking, particularly in terms of performance and security enhancements. The collection and transmission of sensitive data across secure networks is crucial... 详细信息
来源: 评论
Searching for an Accurate Robot Calibration via Improved Levenberg–Marquardt and Radial Basis Function System
收藏 引用
Journal of Field Robotics 2025年 第0期
作者: Li, Zhibin Deng, Xun Chen, Tinghui Yang, Yuhang Chen, Linlin Yang, Xiwen Hu, Zhenzhen Hu, Lun Hu, Pengwei Li, Shuai Luo, Xin Xinjiang Technical Institute of Physics & Chemistry Chinese Academy of Sciences Urumqi China School of Software Engineering Chengdu University of Information Technology Chengdu China Dazhou Key Laboratory of Government Data Security Sichuan University of Arts and Science Dazhou China School of Software Engineering Xinjiang University Urumqi China Faculty of Information Technology and Electrical Engineering University of Oulu Oulu Finland VTT-Technical Research Centre of Finland Oulu Finland College of Computer and Information Science Southwest University Chongqing China
Robots are frequently utilized in manufacturing, aviation, and other industries, which enhance industrial production efficiency and quality. Specifically, robots perform high-precision tasks like welding, assembly and... 详细信息
来源: 评论
Improving Complex Reasoning over Knowledge Graph with Logic-Aware Curriculum Tuning
arXiv
收藏 引用
arXiv 2024年
作者: Xia, Tianle Ding, Liang Wan, Guojia Zhan, Yibing Du, Bo Tao, Dacheng School of Computer Science National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University China The University of Sydney Australia JD Explore Academy China College of Computing and Data Science Nanyang Technological University Singapore639798 Singapore
Answering complex queries over incomplete knowledge graphs (KGs) is a challenging task. Most previous works have focused on learning entity/relation embeddings and simulating first-order logic operators with various n... 详细信息
来源: 评论
Vulnerability Detection with Graph Simplification and Enhanced Graph Representation Learning
Vulnerability Detection with Graph Simplification and Enhanc...
收藏 引用
International Conference on software engineering (ICSE)
作者: Xin-Cheng Wen Yupan Chen Cuiyun Gao Hongyu Zhang Jie M. Zhang Qing Liao School of Computer Science and Technology Harbin Institute of Technology Shenzhen China Peng Cheng Laboratory and Guangdong Provincial Key Laboratory Novel Security Intelligence Technologies School of Big Data and Software Engineering Chongqing University China Department of Informatics King's College London UK Peng Cheng Laboratory
Prior studies have demonstrated the effectiveness of Deep Learning (DL) in automated software vulnerability detection. Graph Neural Networks (GNNs) have proven effective in learning the graph representations of source...
来源: 评论
Reversible adversarial information hiding based on the interpretation of neural network
收藏 引用
Digital Signal Processing: A Review Journal 2025年 165卷
作者: Li, Ruiping Wang, Xi Cui, Qingchen Li, Ming Information Construction and Management Office Henan Normal University Xinxiang453007 China School of Artificial Intelligence and Software Engineering Nanyang Normal University Nanyang473061 China Henan Engineering Research Center of Intelligent Processing for Big Data of Digital Image Henan Nanyang473000 China College of Information Engineering Zhoukou Vocational College of Arts and Science Zhoukou466000 China College of Computer and Information Engineering Henan Normal University Xinxiang453007 China Key Laboratory of Artificial Intelligence and Personalized Learning in Education of Henan Province Xinxiang453007 China
The emerging technology of adversarial information hiding can generate adversarial example by embedding useful information instead of meaningless noise into the host image. The obtained image can deceive classificatio... 详细信息
来源: 评论
Look Inside for More: Internal Spatial Modality Perception for 3D Anomaly Detection
arXiv
收藏 引用
arXiv 2024年
作者: Liang, Hanzhe Xie, Guoyang Hou, Chengbin Wang, Bingshu Gao, Can Wang, Jinbao College of Computer Science and Software Engineering Shenzhen University Shenzhen China Shenzhen Audencia Financial Technology Institute Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Department of Intelligent Manufacturing CATL Ningde China School of Computing and Artificial Intelligence Fuyao University of Science and Technology Fuzhou China School of Software Northwestern Polytechnical University Xi’an China Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen China
3D anomaly detection has recently become a significant focus in computer vision. Several advanced methods have achieved satisfying anomaly detection performance. However, they typically concentrate on the external str... 详细信息
来源: 评论
Intelligent Gen: An Efficient On-Demand Access Protocol in MANETs using Network Simulator - 2
Intelligent Gen: An Efficient On-Demand Access Protocol in M...
收藏 引用
International Conference on Computing for Sustainable Global Development (INDIACom)
作者: T. Ganesan N. Murali S. Palani Murugan M. Chandrakumar Peter P. Anand Raj S. Manikandan Department of Computer Science & Engineering E.G.S. Pillay Engineering College Nagapattinam Tamil Nadu India Department of Artificial Intelligence & Data Science E.G.S. Pillay Engineering College Nagapattinam Tamil Nadu India Department of Software Engineering Periyar Maniammai Institute of Science & Technology Thanjavur Tamil Nadu India Department of Computer Science and Business Systems E.G.S. Pillay Engineering College Nagapattinam Tamil Nadu India Department of Information Technology E.G.S. Pillay Engineering College Nagapattinam Tamil Nadu India
Mobile Ad-Hoc network is a self-configuring and multi-hop collection of mobile devices for making successful communication. The wireless and mobile communication process are encountered based on bandwidth, process con...
来源: 评论