咨询与建议

限定检索结果

文献类型

  • 632 篇 期刊文献
  • 571 篇 会议
  • 3 册 图书

馆藏范围

  • 1,206 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 804 篇 工学
    • 618 篇 计算机科学与技术...
    • 540 篇 软件工程
    • 193 篇 信息与通信工程
    • 129 篇 生物工程
    • 96 篇 电气工程
    • 96 篇 控制科学与工程
    • 93 篇 生物医学工程(可授...
    • 74 篇 光学工程
    • 65 篇 电子科学与技术(可...
    • 46 篇 化学工程与技术
    • 35 篇 机械工程
    • 28 篇 动力工程及工程热...
    • 26 篇 建筑学
    • 24 篇 仪器科学与技术
    • 23 篇 安全科学与工程
    • 23 篇 网络空间安全
  • 452 篇 理学
    • 233 篇 数学
    • 149 篇 生物学
    • 99 篇 统计学(可授理学、...
    • 74 篇 物理学
    • 57 篇 化学
    • 43 篇 系统科学
  • 244 篇 管理学
    • 146 篇 管理科学与工程(可...
    • 100 篇 图书情报与档案管...
    • 58 篇 工商管理
  • 85 篇 医学
    • 71 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
    • 31 篇 公共卫生与预防医...
  • 34 篇 法学
    • 25 篇 社会学
  • 20 篇 农学
  • 14 篇 经济学
  • 8 篇 教育学
  • 5 篇 军事学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 45 篇 feature extracti...
  • 40 篇 deep learning
  • 38 篇 training
  • 36 篇 semantics
  • 28 篇 computational mo...
  • 27 篇 accuracy
  • 26 篇 data models
  • 23 篇 machine learning
  • 23 篇 cloud computing
  • 22 篇 big data
  • 21 篇 predictive model...
  • 19 篇 federated learni...
  • 18 篇 convolution
  • 18 篇 contrastive lear...
  • 17 篇 security
  • 16 篇 visualization
  • 16 篇 correlation
  • 15 篇 reinforcement le...
  • 15 篇 task analysis
  • 15 篇 optimization

机构

  • 123 篇 college of compu...
  • 102 篇 national enginee...
  • 47 篇 school of big da...
  • 35 篇 school of big da...
  • 34 篇 college of big d...
  • 33 篇 college of compu...
  • 29 篇 key laboratory o...
  • 29 篇 shenzhen researc...
  • 28 篇 college of compu...
  • 24 篇 college of compu...
  • 23 篇 school of comput...
  • 22 篇 big data institu...
  • 22 篇 guangdong provin...
  • 19 篇 shenzhen institu...
  • 17 篇 shenzhen univers...
  • 16 篇 peng cheng labor...
  • 16 篇 college of compu...
  • 14 篇 school of comput...
  • 14 篇 state key labora...
  • 14 篇 shenzhen univers...

作者

  • 37 篇 shen linlin
  • 18 篇 li jianqiang
  • 15 篇 shi qingjiang
  • 15 篇 huang joshua zhe...
  • 13 篇 gao can
  • 12 篇 xiuhua li
  • 12 篇 victor c. m. leu...
  • 12 篇 wang jinbao
  • 12 篇 jianqiang li
  • 12 篇 linlin shen
  • 11 篇 li xiuhua
  • 11 篇 jie chen
  • 10 篇 pan jeng-shyang
  • 10 篇 leung victor c.m...
  • 10 篇 xiaofei wang
  • 10 篇 abduljabbar zaid...
  • 9 篇 zhou jie
  • 9 篇 zhong ming
  • 9 篇 tian chunwei
  • 9 篇 yu jiguo

语言

  • 1,064 篇 英文
  • 132 篇 其他
  • 14 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Big Data Institute College of Computer Science and Software Engineering"
1206 条 记 录,以下是671-680 订阅
排序:
Scalable Inter-Domain Network Virtualization
SSRN
收藏 引用
SSRN 2022年
作者: Sun, Jie Wo, Tianyu Liu, Xudong Ma, Tianjiao Mou, Xudong Lan, Jinghong Zhang, Nan Niu, Jianwei SKLSDE School of Computer Science and Engineering Beihang University Beijing China SKLSDE School of Software Beihang University Beijing China Research Center of Big Data and Computational Intelligence Hangzhou Institute of Beihang University Hangzhou China
To realize inter-domain network virtualization for hybrid cloud, the following challenges must be resolved. (1) Scalability. The network virtualization system should allow tenant virtual networks to use on-demand addr... 详细信息
来源: 评论
TCEIP: Text Condition Embedded Regression Network for Dental Implant Position Prediction
arXiv
收藏 引用
arXiv 2023年
作者: Yang, Xinquan Xie, Jinheng Li, Xuguang Li, Xuechen Li, Xin Shen, Linlin Deng, Yongqiang College of Computer Science and Software Engineering Shenzhen University Shenzhen China AI Research Center for Medical Image Analysis and Diagnosis Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Department of Stomatology Shenzhen University General Hospital Shenzhen China National University of Singapore Singapore
When deep neural network has been proposed to assist the dentist in designing the location of dental implant, most of them are targeting simple cases where only one missing tooth is available. As a result, literature ... 详细信息
来源: 评论
EEG Epileptic Seizure Detection Based on Fused Brain Functional Networks  2nd
EEG Epileptic Seizure Detection Based on Fused Brain Functio...
收藏 引用
2nd International Conference on Applied Intelligence, ICAI 2024
作者: Zhou, Pengfei Pan, Yijie Zhang, Xun Shou, Jibin Guo, Jiayang Xu, Meiyan Gu, Peipei College of Software Engineering Zhengzhou University of Light Industry Zhengzhou450000 China Ningbo Institute of Digital Twin Eastern Institute of Technology Ningbo China Zhejiang Moorgen Group Co. Ltd. Zhejiang310000 China Department of Hematology School of Medicine Xiamen University Xiamen361000 China National Institute for Data Science in Health and Medicine Xiamen University Xiamen361000 China College of Computer Science Minnan Normal University Zhangzhou363000 China
Epilepsy, characterized by abnormal neuronal discharges, is a widespread neurological disorder. Traditional detection methods primarily focus on extracting time-frequency features from raw electroencephalogram (EEG) s... 详细信息
来源: 评论
KADEL: Knowledge-Aware Denoising Learning for Commit Message Generation
arXiv
收藏 引用
arXiv 2024年
作者: Tao, Wei Zhou, Yucheng Wang, Yanlin Zhang, Hongyu Wang, Haofen Zhang, Wenqiang Shanghai Engineering Research Center of AI and Robotics Academy for Engineering and Technology Fudan University Shanghai China State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science University of Macau China School of Software Engineering Sun Yat-sen University Guangdong Zhuhai519082 China School of Big Data and Software Engineering Chongqing University Chongqing China College of Design and Innovation Tongji University Shanghai China Engineering Research Center of AI and Robotics Ministry of Education Academy for Engineering and Technology Shanghai Key Lab of Intelligent Information Processing School of Computer Science Fudan University 220 Handan Road Shanghai200433 China
Commit messages are natural language descriptions of code changes, which are important for software evolution such as code understanding and maintenance. However, previous methods are trained on the entire dataset wit... 详细信息
来源: 评论
Traceability and Identity Protection in Smart Agricultural IoT System Framework Based on Blockchains
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Xie, Mingyue Liu, Jun Chen, Shuyu Lin, Mingwei Xu, Guangxia Xu, Zeshui Chang, Zheng University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Chongqing University of Posts and Telecommunications School of Software Engineering Chongqing400065 China Chongqing University School of Big Data and Software Engineering Chongqing400065 China Fujian Normal University College of Computer and Cyber Security Fuzhou350007 China Guangzhou University Cyberspace Institute of Advanced Technology Guangzhou510006 China Sichuan University Business School Chengdu610000 China University of Jyväskylä Faculty of Information Technology P.O. Box 35 JyväskyläFIN-40014 Finland
Blockchain-based IoT applications in agriculture have drawn extensive attention in recent years, allowing the implementation of smart agriculture solutions. By transmitting collected relevant data to a control center ... 详细信息
来源: 评论
A Blockchain-Based Multi-Cloud Storage data Consistency Verification Scheme
A Blockchain-Based Multi-Cloud Storage Data Consistency Veri...
收藏 引用
IEEE International Conference on big data and Cloud Computing (BdCloud)
作者: Feiyu Wang Jian-tao Zhou Hao Wang Xu Guo College of Computer Science Inner Mongolia University Hohhot China Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Inner Mongolia Key Laboratory of Social Computing and Data Processing Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Engineering Research Center of Ecological Big Data Ministry of Education National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian China
Users worldwide widely use cloud storage because of its efficiency, convenience, and high availability. Multi-cloud storage is usually selected to ensure the high availability of data. Unfortunately, when data is migr... 详细信息
来源: 评论
Action-Manipulation Attack and Defense to X-Armed Bandits
Action-Manipulation Attack and Defense to X-Armed Bandits
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Zhi Luo Youqi Li Lixing Chen Zichuan Xu Pan Zhou School of Cyber Science and Engineering Huazhong University of Science and Technology School of Computer Science School of Cyberspace Science and Technology Beijing Institute of Technology Institute of Cyber Science and Technology Shanghai Jiao Tong University School of Software Dalian University of Technology Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology
As a continuous variant of Multi-armed bandits (MAB), $\mathcal{X}$-armed bandits have enriched many applications of online machine learning like personalized recommendation system. However, the attack and defense to ... 详细信息
来源: 评论
MFCLIP: Multi-modal Fine-grained CLIP for Generalizable Diffusion Face Forgery Detection
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Yaning Wang, Tianyi Yu, Zitong Gao, Zan Shen, Linlin Chen, Shengyong Jinan250353 China Nanyang Technological University 50 Nanyang Ave Block N 4 639798 Singapore School of Computing and Information Technology Great Bay University Dongguan523000 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China Jinan250014 China The Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin300384 China Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen518129 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen518060 China
The rapid development of photo-realistic face generation methods has raised significant concerns in society and academia, highlighting the urgent need for robust and generalizable face forgery detection (FFD) techniqu... 详细信息
来源: 评论
data Poisoning Attack to X-armed Bandits
Data Poisoning Attack to X-armed Bandits
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Zhi Luo Youqi Li Lixing Chen Zichuan Xu Pan Zhou School of Cyber Science and Engineering Huazhong University of Science and Technology School of Cyberspace Science and Technology and School of Computer Science Beijing Institute of Technology Institute of Cyber Science and Technology Shanghai Jiao Tong University School of Software Dalian University of Technology Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology
X-armed bandits have achieved the state-of-the-art performance in optimizing unknown stochastic continuous functions, which can model many machine learning tasks, specially in big data-driven personalized recommendati... 详细信息
来源: 评论
Adaptive Divergence-based Non-negative Latent Factor Analysis
arXiv
收藏 引用
arXiv 2022年
作者: Yuan, Ye Yuan, Guangxiao Wang, Renfang Luo, Xin The College of Computer and Information Science Southwest University Chongqing400715 China The Business School University of Technology Sydney PO Box 123 BroadwayNSW2007 Australia The College of Big Data and Software Engineering Zhejiang Wanli University Ningbo315100 China
High-Dimensional and Incomplete (HDI) data are frequently found in various industrial applications with complex interactions among numerous nodes, which are commonly non-negative for representing the inherent non-nega... 详细信息
来源: 评论